{"appState":{"pageLoadApiCallsStatus":true},"categoryState":{"relatedCategories":{"headers":{"timestamp":"2025-04-17T16:01:06+00:00"},"categoryId":33585,"data":{"title":"General Networking","slug":"general-networking","image":{"src":null,"width":0,"height":0},"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"parentCategory":{"categoryId":33581,"title":"Networking","slug":"networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"}},"childCategories":[],"description":"From virtual networks to GIS and IT architecture, our networking articles take a bunch of acronyms and make 'em understandable to the average human.","relatedArticles":{"self":"https://dummies-api.dummies.com/v2/articles?category=33585&offset=0&size=5"},"hasArticle":true,"hasBook":true,"articleCount":155,"bookCount":15},"_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"relatedCategoriesLoadedStatus":"success"},"listState":{"list":{"count":10,"total":157,"items":[{"headers":{"creationTime":"2016-08-18T14:13:09+00:00","modifiedTime":"2024-10-28T13:48:38+00:00","timestamp":"2024-10-28T15:01:13+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Configuring Network Connections for Windows 10","strippedTitle":"configuring network connections for windows 10","slug":"configuring-network-connections-windows-10","canonicalUrl":"","seo":{"metaDescription":"Windows usually detects the presence of a network adapter automatically; typically, you don’t have to install device drivers manually for the adapter. When Wind","noIndex":0,"noFollow":0},"content":"Windows usually detects the presence of a network adapter automatically; typically, you don’t have to install device drivers manually for the adapter. When Windows detects a network adapter, Windows automatically creates a network connection and configures it to support basic networking protocols. You may need to change the configuration of a network connection manually, however.\r\n\r\nThe following steps show you how to configure your network adapter on a Windows 10 system:\r\n\r\n ","description":"Windows usually detects the presence of a network adapter automatically; typically, you don’t have to install device drivers manually for the adapter. When Windows detects a network adapter, Windows automatically creates a network connection and configures it to support basic networking protocols. You may need to change the configuration of a network connection manually, however.\r\n\r\nThe following steps show you how to configure your network adapter on a Windows 10 system:\r\n\r\n ","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":253759,"title":"The 2 Pillars of Cybersecurity","slug":"2-pillars-cybersecurity","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253759"}},{"articleId":253756,"title":"Securing the Human Firewall","slug":"securing-human-firewall","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253756"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-671fa739c15f1\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-671fa739c1e99\"></div></div>"},"articleType":{"articleType":"Step by Step","articleList":null,"content":[{"title":"Click the Start icon (or press the Start button on the keyboard), and then tap or click Settings.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>The Settings page appears.</p>\n"},{"title":"Click Network & Internet.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Network-Internet-page.jpg","width":220,"height":173},"image":{"src":"https://www.dummies.com/wp-content/uploads/Network-Internet-page.jpg","width":535,"height":422},"content":"<p>The Network &amp; Internet page appears.</p>\n"},{"title":"Click Ethernet.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Ethernet-settings-page.jpg","width":220,"height":173},"image":{"src":"https://www.dummies.com/wp-content/uploads/Ethernet-settings-page.jpg","width":535,"height":422},"content":"<p>The Ethernet settings page appears.</p>\n"},{"title":"Click Change Adapter Options.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Network-Connections-page.jpg","width":220,"height":165},"image":{"src":"https://www.dummies.com/wp-content/uploads/Network-Connections-page.jpg","width":535,"height":403},"content":"<p>The Network Connections page appears. This page lists each of your network adapters. In this case, only a single wired Ethernet adapter is shown. If the device has more than one adapter, additional adapters will appear on this page.</p>\n"},{"title":"Right-click the connection that you want to configure and then choose Properties from the contextual menu that appears.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Ethernet-Properties-198x255.jpg","width":198,"height":255},"image":{"src":"https://www.dummies.com/wp-content/uploads/Ethernet-Properties2.jpg","width":535,"height":689},"content":"<p>This action opens the Ethernet Properties dialog box.</p>\n"},{"title":"To configure the network adapter card settings, click Configure.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Properties-220x255.jpg","width":220,"height":255},"image":{"src":"https://www.dummies.com/wp-content/uploads/Properties2.jpg","width":535,"height":620},"content":"<p>The Properties dialog box for your network adapter appears. This dialog box has seven tabs that let you configure the adapter:</p>\n<ul>\n<li><em>General:</em> Shows basic information about the adapter, such as the device type and status.</li>\n<li><em>Advanced:</em> Lets you set a variety of device-specific parameters that affect the operation of the adapter.</li>\n<li><em>About:</em> Displays information about the device’s patent protection.</li>\n<li><em>Driver</em>: Displays information about the device driver that’s bound to the NIC and lets you update the driver to a newer version, roll back the driver to a previously working version, or uninstall the driver.</li>\n<li><em>Details:</em> With this tab, you can inspect various properties of the adapter such as the date and version of the device driver. To view the setting of a particular property, select the property name from the drop-down list.</li>\n<li><em>Events:</em> Lists recent events that have been logged for the device.</li>\n<li><em>Power Management:</em> Lets you configure power management options for the device.</li>\n</ul>\n<p>When you click OK to dismiss the dialog box, the network connection’s Properties dialog box closes and you’re returned to the Network Connections page. Right-click the network adapter and choose Properties again to continue the procedure.</p>\n"},{"title":"Review the list of connection items listed in the Properties dialog box.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<ul>\n<li><em>Client for Microsoft Networks:</em> This item is required if you want to access a Microsoft Windows network. It should always be present.</li>\n<li><em>File and Printer Sharing for Microsoft Networks:</em> This item allows your computer to share its files or printers with other computers on the network.This option is usually used with peer-to-peer networks, but you can use it even if your network has dedicated servers. If you don’t plan to share files or printers on the client computer, however, you should disable this item.</li>\n<li><em>Internet Protocol Version 4 (TCP/IPv4):</em> This item enables the client computer to communicate by using the version 4 standard TCP/IP protocol.</li>\n<li><em>Internet Protocol Version 6 (TCP/IPv6):</em> This item enables version 6 of the standard TCP/IP protocol. Typically, both IP4 and IP6 are enabled, even though most networks rely primarily on IP4.</li>\n</ul>\n"},{"title":"If a protocol that you need isn’t listed, click the Install button to add the needed protocol.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>A dialog box appears, asking whether you want to add a network client, protocol, or service. Click Protocol and then click Add. A list of available protocols appears. Select the one you want to add; then click OK.</p>\n"},{"title":"To remove a network item that you don’t need (such as File and Printer Sharing for Microsoft Networks), select the item, and click the Uninstall button.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>For security reasons, you should make it a point to remove any clients, protocols, or services that you don’t need.</p>\n"},{"title":"To configure TCP/IP settings, click Internet Protocol (TCP/IP); click Properties to display the TCP/IP Properties dialog box; adjust the settings; and then click OK.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Configuring-TCP-IP.jpg","width":220,"height":250},"image":{"src":"https://www.dummies.com/wp-content/uploads/Configuring-TCP-IP2.jpg","width":535,"height":609},"content":"<p>The TCP/IP Properties dialog box lets you choose among these options:</p>\n<ul>\n<li><em>Obtain an IP Address Automatically:</em> Choose this option if your network has a DHCP server that assigns IP addresses automatically. Choosing this option dramatically simplifies administering TCP/IP on your network.</li>\n<li><em>Use the Following IP Address:</em> If your computer must have a specific IP address, choose this option and then type the computer’s IP address, subnet mask, and default gateway address.</li>\n<li><em>Obtain DNS Server Address Automatically:</em> The DHCP server can also provide the address of the Domain Name System (DNS) server that the computer should use. Choose this option if your network has a DHCP server.</li>\n<li><em>Use the Following DNS Server Addresses:</em> Choose this option if a DNS server isn’t available. Then type the IP addresses of the primary and secondary DNS servers.</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-08-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":221858},{"headers":{"creationTime":"2018-06-28T19:14:30+00:00","modifiedTime":"2023-08-31T15:24:34+00:00","timestamp":"2023-08-31T18:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"The 2 Pillars of Cybersecurity","strippedTitle":"the 2 pillars of cybersecurity","slug":"2-pillars-cybersecurity","canonicalUrl":"","seo":{"metaDescription":"As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity pla","noIndex":0,"noFollow":0},"content":"As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity plan:\r\n<ul>\r\n \t<li><strong>Prevention:</strong> The first pillar of cybersecurity is technology that you can deploy to prevent bad actors from penetrating your network and stealing or damaging your data. This technology includes firewalls that block unwelcome access, antivirus programs that detect malicious software, patch management tools that keep your software up to date, and antispam programs that keep suspicious email from reaching your users’ inboxes.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">The most important part of the prevention pillar is the <a href=\"https://www.dummies.com/article/technology/information-technology/networking/general-networking/securing-human-firewall-253756/\">human firewall</a>. Technology can only go so far in preventing successful cyber attacks. Most successful attacks are the result of users opening email attachments or clicking web links that they should have known were dangerous. Thus, in addition to providing technology to prevent attacks, you also need to make sure your users know how to spot and avoid suspicious email attachments and web links.</p>\r\n\r\n<ul>\r\n \t<li><strong>Recovery:</strong> The second pillar of cybersecurity is necessary because the first pillar isn’t always successful. Successful cyber attacks are inevitable, so you need to have technology and plans in place to quickly recover from them when you do.</li>\r\n</ul>","description":"As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity plan:\r\n<ul>\r\n \t<li><strong>Prevention:</strong> The first pillar of cybersecurity is technology that you can deploy to prevent bad actors from penetrating your network and stealing or damaging your data. This technology includes firewalls that block unwelcome access, antivirus programs that detect malicious software, patch management tools that keep your software up to date, and antispam programs that keep suspicious email from reaching your users’ inboxes.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">The most important part of the prevention pillar is the <a href=\"https://www.dummies.com/article/technology/information-technology/networking/general-networking/securing-human-firewall-253756/\">human firewall</a>. Technology can only go so far in preventing successful cyber attacks. Most successful attacks are the result of users opening email attachments or clicking web links that they should have known were dangerous. Thus, in addition to providing technology to prevent attacks, you also need to make sure your users know how to spot and avoid suspicious email attachments and web links.</p>\r\n\r\n<ul>\r\n \t<li><strong>Recovery:</strong> The second pillar of cybersecurity is necessary because the first pillar isn’t always successful. Successful cyber attacks are inevitable, so you need to have technology and plans in place to quickly recover from them when you do.</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":253902,"title":"The Many Types of Mobile Devices on Your Network","slug":"many-types-mobile-devices-network","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253902"}},{"articleId":253889,"title":"How to Install Fedora 26","slug":"install-fedora-26","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253889"}},{"articleId":253886,"title":"Virtual Consoles and the Installation Program","slug":"virtual-consoles-installation-program","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253886"}},{"articleId":253881,"title":"How to Get to a Linux Command Shell","slug":"get-linux-command-shell","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253881"}},{"articleId":253870,"title":"How to Configure Remote Desktop Options","slug":"configure-remote-desktop-options","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253870"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":253756,"title":"Securing the Human Firewall","slug":"securing-human-firewall","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253756"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281780,"slug":"networking-all-in-one-for-dummies","isbn":"9781119689010","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119689015-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-all-in-one-for-dummies-8e-cover-9781119689010-203x255.jpg","width":203,"height":255},"title":"Networking All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"8946\">Doug Lowe</b> </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55f1a457\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55f1abef\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2023-08-31T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":253759},{"headers":{"creationTime":"2018-06-28T19:11:30+00:00","modifiedTime":"2023-08-31T15:24:17+00:00","timestamp":"2023-08-31T18:01:02+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Securing the Human Firewall","strippedTitle":"securing the human firewall","slug":"securing-human-firewall","canonicalUrl":"","seo":{"metaDescription":"Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with t","noIndex":0,"noFollow":0},"content":"Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with the most difficult job of network security: securing your network’s users. All the best-laid security plans are for naught if your users write down their passwords on sticky notes and post them on their computers and click every link that shows up in their email.\r\n\r\nThe key to securing your network users is to empower your users to realize that they’re an important part of your company’s cybersecurity plan, and then show them what they can do to become an effective human firewall.\r\n\r\nThis necessarily involves training, and of course IT training is usually the most dreaded type of training there is. So, do your best to make the training fun and engaging rather than dull and boring.\r\n\r\nIf training isn’t your thing, search the web. You’ll find plenty of inexpensive options for online cybersecurity training, ranging from simple and short videos to full-length online courses.\r\n\r\nYou’ll also need to establish a written cybersecurity policy and stick to it. Have a meeting with everyone to go over the security policy to make sure that everyone understands the rules. Also, make sure to have consequences when violations occur.\r\n\r\nHere are some suggestions for some basic security rules you can incorporate into your security policy:\r\n<ul>\r\n \t<li>Never write down your password or give it to someone else.</li>\r\n \t<li>Accounts should not be shared. Never use someone else’s account to access a resource that you can’t access under your own account. If you need access to some network resource that isn’t available to you, you should formally request access under your own account.</li>\r\n \t<li>Likewise, never give your account information to a co-worker so that he or she can access a needed resource. Your co-worker should instead formally request access under his or her own account.</li>\r\n \t<li>Don’t install any software or hardware on your computer — especially wireless access devices or modems — without first obtaining permission.</li>\r\n \t<li>Don’t enable file and printer sharing on workstations without first getting permission.</li>\r\n \t<li>Never attempt to disable or bypass the network’s security features.</li>\r\n</ul>","description":"Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with the most difficult job of network security: securing your network’s users. All the best-laid security plans are for naught if your users write down their passwords on sticky notes and post them on their computers and click every link that shows up in their email.\r\n\r\nThe key to securing your network users is to empower your users to realize that they’re an important part of your company’s cybersecurity plan, and then show them what they can do to become an effective human firewall.\r\n\r\nThis necessarily involves training, and of course IT training is usually the most dreaded type of training there is. So, do your best to make the training fun and engaging rather than dull and boring.\r\n\r\nIf training isn’t your thing, search the web. You’ll find plenty of inexpensive options for online cybersecurity training, ranging from simple and short videos to full-length online courses.\r\n\r\nYou’ll also need to establish a written cybersecurity policy and stick to it. Have a meeting with everyone to go over the security policy to make sure that everyone understands the rules. Also, make sure to have consequences when violations occur.\r\n\r\nHere are some suggestions for some basic security rules you can incorporate into your security policy:\r\n<ul>\r\n \t<li>Never write down your password or give it to someone else.</li>\r\n \t<li>Accounts should not be shared. Never use someone else’s account to access a resource that you can’t access under your own account. If you need access to some network resource that isn’t available to you, you should formally request access under your own account.</li>\r\n \t<li>Likewise, never give your account information to a co-worker so that he or she can access a needed resource. Your co-worker should instead formally request access under his or her own account.</li>\r\n \t<li>Don’t install any software or hardware on your computer — especially wireless access devices or modems — without first obtaining permission.</li>\r\n \t<li>Don’t enable file and printer sharing on workstations without first getting permission.</li>\r\n \t<li>Never attempt to disable or bypass the network’s security features.</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":253902,"title":"The Many Types of Mobile Devices on Your Network","slug":"many-types-mobile-devices-network","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253902"}},{"articleId":253889,"title":"How to Install Fedora 26","slug":"install-fedora-26","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253889"}},{"articleId":253886,"title":"Virtual Consoles and the Installation Program","slug":"virtual-consoles-installation-program","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253886"}},{"articleId":253881,"title":"How to Get to a Linux Command Shell","slug":"get-linux-command-shell","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253881"}},{"articleId":253870,"title":"How to Configure Remote Desktop Options","slug":"configure-remote-desktop-options","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253870"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":253759,"title":"The 2 Pillars of Cybersecurity","slug":"2-pillars-cybersecurity","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253759"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281780,"slug":"networking-all-in-one-for-dummies","isbn":"9781119689010","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119689015-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-all-in-one-for-dummies-8e-cover-9781119689010-203x255.jpg","width":203,"height":255},"title":"Networking All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"8946\">Doug Lowe</b> </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55ec77fd\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55ec853c\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2023-08-31T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":253756},{"headers":{"creationTime":"2016-03-26T15:28:10+00:00","modifiedTime":"2022-09-30T19:28:49+00:00","timestamp":"2022-09-30T21:01:02+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Useful Websites for Networking Information","strippedTitle":"useful websites for networking information","slug":"useful-websites-for-networking-information","canonicalUrl":"","seo":{"metaDescription":"Check out this helpful list of websites useful to network administrators, including for domain registration, checking your TCP/IP, and more.","noIndex":0,"noFollow":0},"content":"As a network administrator, the Internet is your best friend for networking resources, solutions, news, and guidance. Here are some websites for you to visit often.\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\"><b>To register domains:</b></p>\r\n<p class=\"child-para\"><a href=\"http://www.internic.net/\">InterNIC</a><u></u></p>\r\n<p class=\"child-para\"><a href=\"http://www.networksolutions.com/\">Network Solutions</a></p>\r\n<p class=\"child-para\"><a href=\"http://www.register.com\">register.com</a></p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>To check your TCP/IP configuration: </b><a href=\"http://www.dnsstuff.com\">DNSstuff</a></p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>To see if your email server has been blocklisted: </b><a href=\"http://www.dnsbl.info\">DNSBL.info</a></p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>To stay current in the industry, try these standards organizations:</b></p>\r\n<p class=\"child-para\"><a href=\"http://www.ieee.org\">Institute of Electrical and Electronics Engineers</a></p>\r\n<p class=\"child-para\"><a href=\"http://www.iso.org\">International Organization for Standardization</a></p>\r\n<p class=\"child-para\"><a href=\"http://www.ietf.org\">Internet Engineering Task Force</a></p>\r\n<p class=\"child-para\"><a href=\"http://www.isoc.org\">Internet Society</a></p>\r\n</li>\r\n</ul>","description":"As a network administrator, the Internet is your best friend for networking resources, solutions, news, and guidance. Here are some websites for you to visit often.\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\"><b>To register domains:</b></p>\r\n<p class=\"child-para\"><a href=\"http://www.internic.net/\">InterNIC</a><u></u></p>\r\n<p class=\"child-para\"><a href=\"http://www.networksolutions.com/\">Network Solutions</a></p>\r\n<p class=\"child-para\"><a href=\"http://www.register.com\">register.com</a></p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>To check your TCP/IP configuration: </b><a href=\"http://www.dnsstuff.com\">DNSstuff</a></p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>To see if your email server has been blocklisted: </b><a href=\"http://www.dnsbl.info\">DNSBL.info</a></p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>To stay current in the industry, try these standards organizations:</b></p>\r\n<p class=\"child-para\"><a href=\"http://www.ieee.org\">Institute of Electrical and Electronics Engineers</a></p>\r\n<p class=\"child-para\"><a href=\"http://www.iso.org\">International Organization for Standardization</a></p>\r\n<p class=\"child-para\"><a href=\"http://www.ietf.org\">Internet Engineering Task Force</a></p>\r\n<p class=\"child-para\"><a href=\"http://www.isoc.org\">Internet Society</a></p>\r\n</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6337590ec5b7a\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6337590ec6cd3\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2022-09-30T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":168555},{"headers":{"creationTime":"2016-03-26T19:58:53+00:00","modifiedTime":"2022-08-01T14:18:39+00:00","timestamp":"2022-09-14T18:19:50+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Network Basics: TCP/IP Protocol Suite","strippedTitle":"network basics: tcp/ip protocol suite","slug":"network-basics-tcpip-protocol-suite","canonicalUrl":"","seo":{"metaDescription":"Learn the basics of the four-layer TCP/IP protocol suite, including how it compares with the seven-layer OSI model.","noIndex":0,"noFollow":0},"content":"<em>Transmission control protocol/Internet protocol</em> (TCP/IP), the protocol on which the Internet is built, is actually not a single protocol but rather an entire suite of related protocols. TCP is even older than Ethernet. It was first conceived in 1969 by the Department of Defense. Currently, the Internet Engineering Task Force, or IETF, manages the TCP/IP protocol suite.\r\n\r\nThe TCP/IP suite is based on a four-layer model of networking that is similar to the seven-layer open systems interconnection (OSI) model. The following illustration shows how the TCP/IP model matches up with the OSI model and where some of the key TCP/IP protocols fit into the model.\r\n\r\nAs you can see, the lowest layer of the model, the Network Interface layer, corresponds to the OSI model’s Physical and Data Link layers. TCP/IP can run over a wide variety of Network Interface layer protocols, including Ethernet, as well as other protocols, such as Token Ring and FDDI (an older standard for fiber-optic networks).\r\n\r\n<img src=\"https://www.dummies.com/wp-content/uploads/288315.image0.jpg\" alt=\"image0.jpg\" width=\"535\" height=\"226\" />\r\n\r\nThe Application layer of the TCP/IP model corresponds to the upper three layers of the OSI model — that is, the Session, Presentation, and Application layers. Many protocols can be used at this level. A few of the most popular are HTTP, FTP, Telnet, SMTP, DNS, and SNMP.\r\n<h2 id=\"tab1\" >IP</h2>\r\nIP is a network layer protocol that is responsible for delivering packets to network devices. The IP protocol uses logical IP addresses to refer to individual devices rather than physical (MAC) addresses. A protocol called ARP (for address resolution protocol) handles the task of converting IP addresses to MAC addresses.\r\n\r\nBecause IP addresses consist of a network part and a host part, IP is a <i>routable protocol. </i>As a result, IP can forward a packet to another network if the host is not on the current network. (The ability to route packets across networks is where IP gets its name. An <em>I</em><i>nternet </i>is a series of two or more connected TCP/IP networks that can be reached by routing.)\r\n<h2 id=\"tab2\" >TCP</h2>\r\nTCP<i> </i>is a connection-oriented transport layer protocol. TCP lets a device reliably send a packet to another device on the same network or on a different network.\r\n\r\nTCP ensures that each packet is delivered if at all possible. It does so by establishing a connection with the receiving device and then sending the packets. If a packet doesn’t arrive, TCP resends the packet. The connection is closed only after the packet has been successfully delivered or an unrecoverable error condition has occurred.\r\n\r\nOne key aspect of TCP is that it’s always used for one-to-one communications. In other words, TCP allows a single network device to exchange data with another single network device. TCP isn’t used to broadcast messages to multiple network recipients. Instead, the user datagram protocol (UDP) is used for that purpose.\r\n\r\nMany well-known application layer protocols rely on TCP. For example, when a web browser requests a page, the browser uses HTTP to send a request via TCP to the web server. When the web server receives the request, it uses HTTP to fulfill the request, again via TCP. Other Application layer protocols that use TCP include Telnet (for terminal emulation), FTP (for file exchange), and SMTP (for e-mail).\r\n<h2 id=\"tab3\">UDP</h2>\r\nThe <i>user datagram protocol</i> is a connectionless transport layer protocol that is used when the overhead of a connection isn't required. After UDP has placed a packet on the network (via the IP protocol), it forgets about it. UDP doesn't guarantee that the packet actually arrives at its destination. Most applications that use UDP simply wait for any replies expected as a result of packets sent via UDP. If a reply doesn't arrive within a certain period of time, the application either sends the packet again or gives up.\r\n\r\nProbably the best-known application layer protocol that uses UDP is the domain name system (DNS). When an application needs to access a domain name such as www.dummies.com, DNS sends a UDP packet to a DNS server to look up the domain. When the server finds the domain, it returns the domain's IP address in another UDP packet.","description":"<em>Transmission control protocol/Internet protocol</em> (TCP/IP), the protocol on which the Internet is built, is actually not a single protocol but rather an entire suite of related protocols. TCP is even older than Ethernet. It was first conceived in 1969 by the Department of Defense. Currently, the Internet Engineering Task Force, or IETF, manages the TCP/IP protocol suite.\r\n\r\nThe TCP/IP suite is based on a four-layer model of networking that is similar to the seven-layer open systems interconnection (OSI) model. The following illustration shows how the TCP/IP model matches up with the OSI model and where some of the key TCP/IP protocols fit into the model.\r\n\r\nAs you can see, the lowest layer of the model, the Network Interface layer, corresponds to the OSI model’s Physical and Data Link layers. TCP/IP can run over a wide variety of Network Interface layer protocols, including Ethernet, as well as other protocols, such as Token Ring and FDDI (an older standard for fiber-optic networks).\r\n\r\n<img src=\"https://www.dummies.com/wp-content/uploads/288315.image0.jpg\" alt=\"image0.jpg\" width=\"535\" height=\"226\" />\r\n\r\nThe Application layer of the TCP/IP model corresponds to the upper three layers of the OSI model — that is, the Session, Presentation, and Application layers. Many protocols can be used at this level. A few of the most popular are HTTP, FTP, Telnet, SMTP, DNS, and SNMP.\r\n<h2 id=\"tab1\" >IP</h2>\r\nIP is a network layer protocol that is responsible for delivering packets to network devices. The IP protocol uses logical IP addresses to refer to individual devices rather than physical (MAC) addresses. A protocol called ARP (for address resolution protocol) handles the task of converting IP addresses to MAC addresses.\r\n\r\nBecause IP addresses consist of a network part and a host part, IP is a <i>routable protocol. </i>As a result, IP can forward a packet to another network if the host is not on the current network. (The ability to route packets across networks is where IP gets its name. An <em>I</em><i>nternet </i>is a series of two or more connected TCP/IP networks that can be reached by routing.)\r\n<h2 id=\"tab2\" >TCP</h2>\r\nTCP<i> </i>is a connection-oriented transport layer protocol. TCP lets a device reliably send a packet to another device on the same network or on a different network.\r\n\r\nTCP ensures that each packet is delivered if at all possible. It does so by establishing a connection with the receiving device and then sending the packets. If a packet doesn’t arrive, TCP resends the packet. The connection is closed only after the packet has been successfully delivered or an unrecoverable error condition has occurred.\r\n\r\nOne key aspect of TCP is that it’s always used for one-to-one communications. In other words, TCP allows a single network device to exchange data with another single network device. TCP isn’t used to broadcast messages to multiple network recipients. Instead, the user datagram protocol (UDP) is used for that purpose.\r\n\r\nMany well-known application layer protocols rely on TCP. For example, when a web browser requests a page, the browser uses HTTP to send a request via TCP to the web server. When the web server receives the request, it uses HTTP to fulfill the request, again via TCP. Other Application layer protocols that use TCP include Telnet (for terminal emulation), FTP (for file exchange), and SMTP (for e-mail).\r\n<h2 id=\"tab3\">UDP</h2>\r\nThe <i>user datagram protocol</i> is a connectionless transport layer protocol that is used when the overhead of a connection isn't required. After UDP has placed a packet on the network (via the IP protocol), it forgets about it. UDP doesn't guarantee that the packet actually arrives at its destination. Most applications that use UDP simply wait for any replies expected as a result of packets sent via UDP. If a reply doesn't arrive within a certain period of time, the application either sends the packet again or gives up.\r\n\r\nProbably the best-known application layer protocol that uses UDP is the domain name system (DNS). When an application needs to access a domain name such as www.dummies.com, DNS sends a UDP packet to a DNS server to look up the domain. When the server finds the domain, it returns the domain's IP address in another UDP packet.","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[{"label":"IP","target":"#tab1"},{"label":"TCP","target":"#tab2"},{"label":"UDP","target":"#tab3"}],"relatedArticles":{"fromBook":[{"articleId":209488,"title":"TCP/IP For Dummies Cheat Sheet","slug":"tcpip-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/209488"}},{"articleId":196388,"title":"TCP/IP Definitions","slug":"tcpip-definitions","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196388"}},{"articleId":196385,"title":"Notable Requests for Comments of Interest to TCP/IP Users","slug":"notable-requests-for-comments-of-interest-to-tcpip-users","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196385"}},{"articleId":196387,"title":"Internet Security Terms and Tips to Use with TCP/IP","slug":"internet-security-terms-and-tips-to-use-with-tcpip","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196387"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281878,"slug":"tcp-ip-for-dummies-6th-edition","isbn":"9780470450604","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/0470450606-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/tcp-ip-for-dummies-6th-edition-cover-9780470450604-202x255.jpg","width":202,"height":255},"title":"TCP / IP For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<b data-author-id=\"10596\">Candace Leiden</b> consults on systems and database performance and instructional design for international courseware. <p><b data-author-id=\"10597\">Marshall Wilensky</b> was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.</p>","authors":[{"authorId":10596,"name":"Candace Leiden","slug":"candace-leiden","description":" <b>Candace Leiden</b> consults on systems and database performance and instructional design for international courseware. <p><b>Marshall Wilensky</b> was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10596"}},{"authorId":10597,"name":"Marshall Wilensky","slug":"marshall-wilensky","description":" <b>Candace Leiden</b> consults on systems and database performance and instructional design for international courseware. <p><b>Marshall Wilensky</b> was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10597"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470450604&quot;]}]\" id=\"du-slot-63221b460c0ba\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470450604&quot;]}]\" id=\"du-slot-63221b460cb36\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2022-08-01T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":185407},{"headers":{"creationTime":"2016-03-27T16:53:26+00:00","modifiedTime":"2022-03-01T17:52:45+00:00","timestamp":"2022-09-14T18:19:18+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Cisco Networking All-in-One For Dummies Cheat Sheet","strippedTitle":"cisco networking all-in-one for dummies cheat sheet","slug":"cisco-networking-all-in-one-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Get acquainted with Cisco network devices and code listings and learn to develop and manage secure Cisco systems.","noIndex":0,"noFollow":0},"content":"To create and configure a Cisco network, you need to know about routers and switches to develop and manage secure Cisco systems. Become acquainted with Cisco network devices and code listings; and find out how to manage static routing and view routing information.","description":"To create and configure a Cisco network, you need to know about routers and switches to develop and manage secure Cisco systems. Become acquainted with Cisco network devices and code listings; and find out how to manage static routing and view routing information.","blurb":"","authors":[{"authorId":9897,"name":"Edward Tetz","slug":"edward-tetz","description":" <p><b>Glen E. Clarke, A&#43;, Network&#43;, Security&#43;,</b> is an independent trainer and consultant. <b>Ed Tetz, A&#43;, MCSE, MCT,</b> has written several guides to MCSE and other certifications. <b>Timothy Warner, MCSE, MCT, A&#43;,</b> is an IT professional, technical trainer, and author. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/9897"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-63221b26d1314\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-63221b26d1d9f\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":186978,"title":"OSI Model for Cisco Networking","slug":"osi-model-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186978"}},{"articleId":186968,"title":"How to Configure a Cisco Network","slug":"how-to-configure-a-cisco-network","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186968"}},{"articleId":186977,"title":"Creating a VLAN for Cisco Networking","slug":"creating-a-vlan-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186977"}},{"articleId":186992,"title":"Using EtherChannel for Cisco Networking","slug":"using-etherchannel-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186992"}},{"articleId":186976,"title":"Working with Spanning Tree Protocol for Cisco Networking","slug":"working-with-spanning-tree-protocol-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186976"}},{"articleId":186983,"title":"Managing Static Routing for Cisco Networking","slug":"managing-static-routing-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186983"}},{"articleId":186975,"title":"Viewing Routing Information for Cisco Networking","slug":"viewing-routing-information-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186975"}},{"articleId":186991,"title":"Securing a Cisco Network","slug":"securing-a-cisco-network","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186991"}}],"content":[{"title":"OSI model for Cisco networking","thumb":null,"image":null,"content":"<p>While you may not use the OSI model every day, you should be familiar with it, specifically when working with Cisco switches and routers (which operate at Layer 2 and Layer 3, respectively). Here are some of the items that operate at each level of the OSI model:</p>\n<table>\n<tbody>\n<tr>\n<th>Layer</th>\n<th>Description</th>\n<th>Examples</th>\n</tr>\n<tr>\n<td>7. Application</td>\n<td>Responsible for initiating or services the request.</td>\n<td>SMTP, DNS, HTTP, and Telnet</td>\n</tr>\n<tr>\n<td>6. Presentation</td>\n<td>Formats the information so that it is understood by the<br />\nreceiving system.</td>\n<td>Compression and encryption depending on the implementation</td>\n</tr>\n<tr>\n<td>5. Session</td>\n<td>Responsible for establishing, managing, and terminating the<br />\nsession.</td>\n<td>NetBIOS</td>\n</tr>\n<tr>\n<td>4. Transport</td>\n<td>Breaks information into segments and is responsible for<br />\nconnection and connectionless communication.</td>\n<td>TCP and UDP</td>\n</tr>\n<tr>\n<td>3. Network</td>\n<td>Responsible for logical addressing and routing</td>\n<td>IP, ICMP, ARP, RIP, IGRP, and routers</td>\n</tr>\n<tr>\n<td>2. Data Link</td>\n<td>Responsible for physical addressing, error correction, and<br />\npreparing the information for the media</td>\n<td>MAC address, CSMA/CD, switches, and bridges</td>\n</tr>\n<tr>\n<td>1. Physical</td>\n<td>Deals with the electrical signal.</td>\n<td>Cables, connectors, hubs, and repeaters</td>\n</tr>\n</tbody>\n</table>\n"},{"title":"How to configure a Cisco network","thumb":null,"image":null,"content":"<p>Like all networks, a Cisco network needs to be properly configured. To do so, you need to know the configuration modes to use when configuring your network. You also should know how to configure an interface, configure a switch management interface, and configure an interface to use DHCP for your Cisco network.</p>\n<h2>Configuration modes for Cisco networking</h2>\n<p>When moving around in the Cisco IOS, you will see many prompts. These prompts change as you move from one configuration mode to another. Here is a summary of the major configuration modes:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>User EXEC mode:</b> When you connect to a Cisco device the default configuration mode is user exec mode. With user exec mode you can view the settings on the device but not make any changes. You know you are in User EXEC mode because the IOS prompt displays a &#8220;&gt;&#8221;.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Privileged EXEC mode:</b> In order to make changes to the device you must navigate to Privileged EXEC mode where you may be required to input a password. Privileged EXEC mode displays with a &#8220;#&#8221; in the prompt.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Global Configuration mode:</b> Global Configuration mode is where you go to make global changes to the router such as the hostname. To navigate to Global Configuration mode from Privileged EXEC mode you type &#8220;configure terminal&#8221; or &#8220;conf t&#8221; where you will be placed at the &#8220;(config)#&#8221; prompt.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Sub Prompts:</b> There are a number of different sub prompts from Global Configuration mode you can navigate to such as the interface prompts to modify settings on a specific interface, or the line prompts to modify the different ports on the device.</p>\n</li>\n</ul>\n<h2>Configure an interface for Cisco networking</h2>\n<p>When working with routers in particular, but also when dealing the management interface on switches, you will often need to configure network interfaces which will either match physical interface ports or virtual interfaces in the form of a virtual LAN (VLAN) interface (when dealing with switches).</p>\n<p>For your router interfaces the following example will set speed, duplex and IP configuration information for the interface FastEthernet 0/0 (notice the interface reference as slot/port). In the case of the router, the interface is enabled using the no shutdown command in the final step; interfaces on switches are enabled by default.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>interface FastEthernet0/0</b>\r\nRouter1(config-if)#<b>description Private LAN</b>\r\nRouter1(config-if)#<b>speed 100</b>\r\nRouter1(config-if)#<b>duplex full</b>\r\nRouter1(config-if)#<b>ip address 192.168.1.1 255.255.255.0</b>\r\nRouter1(config-if)#<b>no shutdown</b></pre>\n<h2>Configure a switch management interface for Cisco networking</h2>\n<p>For your switches, to enable an IP address on your management interface, you will use something similar to this example. In this example, management is being performed over VLAN 1 &#8211; the default VLAN.</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1#<b>interface VLAN 1</b>\r\nSwitch1(config-if)#<b>ip address 192.168.1.241 255.255.255.0</b></pre>\n<h2>Configure an interface to use DHCP for Cisco networking</h2>\n<p>If you want to configure either a router or switch to retrieve its IP configuration information from a network Dynamic Host Configuration Protocol (DHCP) server, then you can commands like the following example.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>interface FastEthernet0/0</b>\r\nRouter1(config-if)#<b>ip dhcp</b></pre>\n"},{"title":"Creating a VLAN for Cisco networking","thumb":null,"image":null,"content":"<p>When working with your Cisco network, you may want to separate users into different broadcast domains for security or traffic reduction. You can do this by implementing VLANs. The following example will create VLAN (VLAN2) and place the ports on a switch (from 1-12) into VLAN2.</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1(config)#<b>interface vlan 2</b>\r\nSwitch1(config-if)#<b>description Finance VLAN</b>\r\nSwitch1(config-if)#<b>exit</b>\r\nSwitch1(config)#<b>interface range FastEthernet 0/1 , FastEthernet 0/12</b>\r\nSwitch1(config-if-range)#<b>switchport mode access</b>\r\nSwitch1(config-if-range)#<b>switchport access vlan 2</b><b>\r\n</b></pre>\n<p>If you are connecting two switches together, then you will want to allow all configured VLANs to pass between the two switches. This is accomplished by implementing a trunk port. To configure port 24 on your switch to be a trunk port, you will use the following code:</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1(config)#<b>interface FastEthernet 0/24</b>\r\nSwitch1(config-if-range)#<b>switchport mode trunk</b></pre>\n"},{"title":"Using EtherChannel for Cisco networking","thumb":null,"image":null,"content":"<p>Don&#8217;t be afraid to use EtherChannel on your Cisco network. EtherChannel allows you to take up to eight network ports on your switch and treat them as a single larger link. This can be used to connect servers with multiple network cards that are bonded (or teamed) to a switch, or to connect multiple switches together. There are two main negotiation protocols, Port Aggregation Protocol (PAgP) which is a proprietary Cisco protocol and Link Aggregation Control Protocol (LACP) which is an open standards protocol.</p>\n<p>To set EtherChannel to use with of the protocols you will configure it to support one of the following modes.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><span class=\"code\">auto</span>: Sets the interface to respond to PAgP negotiation packets, but the interface will start negotiations on its own.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">desireable</span>: Sets the interface to actively attempt to negotiate a PAgP connection.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">on</span>: Forces the connection to bring all links up without using a protocol to negotiate connections. This mode can only connect to another device that is also set to <b>on</b>. When using this mode, the switch does not negotiate the link using either PAgP or LACP.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">active</span>: Sets the interface to actively attempt to negotiate connections with other LACP devices.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">passive</span>: Sets the interface to respond to LACP data if it receives negotiation requests from other systems.</p>\n</li>\n</ul>\n<p>The following example will configure EtherChannel to use group ports 11 and 12 on the switch together using PAgP as the protocol. The same type of command would be used on the switch to which Switch1 is connected.</p>\n<pre class=\"code\">Switch1&gt; <b>enable</b>\r\nSwitch1# <b>configure terminal</b> \r\nSwitch1(config)# <b>interface range FastE</b><b>thernet0/1</b><b>1</b><b> -</b><b>1</b><b>2</b> \r\nSwitch1(config-if-range)# <b>switchport mode access</b>\r\nSwitch1(config-if-range)# <b>switchport access vlan 10</b>\r\nSwitch1(config-if-range)# <b>channel-group 5 mode desirable</b></pre>\n"},{"title":"Working with spanning tree protocol for Cisco networking","thumb":null,"image":null,"content":"<p>Spanning Tree Protocol (STP) enables you to create redundant loops on your Cisco network for fault tolerance, and prevents inadvertent loops that may be created on your network from bringing the network to its knees.</p>\n<p>The following code will enable the Cisco proprietary Rapid Per VLAN Spanning Tree Protocol (PVST) over the open standard of Multiple Spanning Tree Protocol (MSTP). In addition to configuring STP on the switch, you will also configure port 2 on the switch for portfast, which allows the port to immediately transition to forwarding mode.</p>\n<pre class=\"code\">Switch1&gt; <b>enable</b>\r\nSwitch1# <b>configure terminal</b> \r\nSwitch1(config)#<b>spanning-tree mode rapid-pvst</b>\r\nSwitch1(config)#<b>interface FastEthernet 0/2</b>\r\nSwitch1(config-if)#<b>spanning-tree portfast</b>\r\n%Warning: portfast should only be enabled on ports connected to a single\r\n host. Connecting hubs, concentrators, switches, bridges, etc... to this\r\n interface when portfast is enabled, can cause temporary bridging loops.\r\n Use with CAUTION\r\n%Portfast will be configured in 10 interfaces due to the range command\r\n but will only have effect when the interfaces are in a non-trunking mode.</pre>\n"},{"title":"Managing static routing for Cisco networking","thumb":null,"image":null,"content":"<p>When working with your routers on your Cisco network, it&#8217;s very likely that you&#8217;ll want to have your routers route data. The first step in having your router pass data from one interface to another interface is to enable routing; just use these commands.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>ip routing</b></pre>\n<p>Whether or not you choose to use a dynamic routing protocol, you may add static routes to your router. The following will add a static route to Router1 to send data to the 192.168.5.0/24 network using the router with the IP address of 192.168.3.2.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>ip routing</b>\r\nRouter1(config)#<b>ip route 192.168.5.0 255.255.255.0 192.168.3.2</b></pre>\n<h2>Managing routing information protocol for Cisco networking</h2>\n<p>Routing Information Protocol (RIP) is widely used, with version 2 allowing you to use Variable Length Subnet Masks (VLSM) across your network. The following code will enable routing, enable RIP, set RIP to version 2, disable route summarization, defines the distributed network from this router as 192.168.5.0/24, and rather than broadcasting routes, it will send RIP data directly to 192.168.1.1.</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nRouter2#<b>configure terminal</b>\r\nRouter2(config)#<b>ip routing</b>\r\nRouter2(config)#<b>router rip</b>\r\nRouter2(config-router)#<b>version 2</b>\r\nRouter2(config-router)#<b>no auto-summary</b>\r\nRouter1(config-router)#<b>network 192.168.5</b><b>.0</b>\r\nRouter2(config-router)#<b>neighbor 192.168.1.1</b></pre>\n<h2>Managing enhanced interior gateway routing protocol for Cisco networking</h2>\n<p>Enhanced Interior Gateway Routing Protocol (EIGRP) is the updated version of IGRP. The following code will enable EIGRP using an autonomous-system (AS) number of 100, distribute two networks and disables auto summary.</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nRouter2#<b>configure terminal</b>\r\nRouter2(config)#<b>ip routing</b>\r\nRouter2(config)#<b>router eigrp 100</b>\r\nRouter2(config-router)#<b>network 192.168.1.0</b>\r\nRouter2(config-router)#<b>network 192.168.5.0</b>\r\nRouter2(config-router)#<b>no auto-summary</b></pre>\n<h2>Managing open shortest path first for Cisco networking</h2>\n<p>Open Shortest Path First (OSPF) is a link state protocol which is widely used. OSPF uses the address of the loopback interface as the OSPF identifier, so this example will set the address of the loopback interface, then enable OSPF with a process ID of 100, and distributing a network of 192.168.255.254 and a network of 192.168. 5.0/24</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nRouter2#<b>configure terminal</b>\r\nRouter2(config)#<b>interface loopback 0</b>\r\nRouter2(config-if)#<b>ip address 192.168.255.254 255.255.255.0</b>\r\nRouter2(config-if)#<b>exit</b>\r\nRouter2(config)#<b>router ospf 100</b>\r\nRouter2(config-router)#<b>network 192.168.255.254 0.0.0.0 area 0</b>\r\nRouter2(config-router)#<b>network 192.168.5.0 0.0.0.255 area 0</b></pre>\n"},{"title":"Viewing routing information for Cisco networking","thumb":null,"image":null,"content":"<p>After setting up any routing protocol that you want to implement &#8211; RIP, OSPF, or EIGRP &#8211; you can view all of your routing information through the <span class=\"code\">ip route</span> command. The following is an example of the output of this command. The output includes a legend showing the codes for each routing protocol, and the specific routes are identified by the source protocol.</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nPassword:\r\nRouter2#<b>show ip route</b>\r\nCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP\r\n D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area\r\n N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2\r\n E1 - OSPF external type 1, E2 - OSPF external type 2\r\n i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2\r\n ia - IS-IS inter area, * - candidate default, U - per-user static route\r\n o - ODR, P - periodic downloaded static route\r\nGateway of last resort is not set\r\nD 192.168.10.0/24 [90/284160] via 192.168.1.1, 00:04:19, FastEthernet0/0\r\nO 192.168.10.0/24 [110/11] via 192.168.1.1, 00:01:01, FastEthernet0/0\r\nR 192.168.10.0/24 [120/1] via 192.168.1.1, 00:00:07, FastEthernet0/0\r\nC 192.168.5.0/24 is directly connected, FastEthernet0/1\r\nC 192.168.1.0/24 is directly connected, FastEthernet0/0\r\nS 192.168.3.0/24 [1/0] via 192.168.1.1</pre>\n"},{"title":"Securing a Cisco network","thumb":null,"image":null,"content":"<p>Security is always a concern, and your Cisco network needs to be properly secured. In the following sections, you see how to secure your Cisco network by configuring NAT, by configuring an ACL, and by applying that ACL.</p>\n<h2>Securing your Cisco network by configuring NAT</h2>\n<p>The following commands are used to configure NAT overload services on a router called Router1. In this example, a list of source address is created in access list #1, which is then used as the inside source list. The FastEthernet 0/0 port is the overloaded public address port that all inside addresses get translated to.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>access-list 1 permit 10.0.0.0 0.255.255.255</b>\r\nRouter1(config)#<b>ip nat inside source list 1 interface FastEthernet 0/0 overload</b>\r\nRouter1(config)#<b>interface FastEthernet0/0</b>\r\nRouter1(config-if)#<b>ip nat outside</b>\r\nRouter1(config-if)#<b>interface FastEthernet0/1</b>\r\nRouter1(config-if)#<b>ip nat inside</b></pre>\n<h2>Securing your Cisco network by configuring an access control list (ACL)</h2>\n<p>ACLs are used to control traffic flow. They can be used allow or deny the flow of traffic. The two main types of ACLs are:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">Standard ACLs, which have fewer <b>options</b> for classifying data and controlling traffic flow than Extended ACLs. They are only able to manage traffic based on the source IP address. These ACLs are numbered from 1–99 and from 1300–1999.</p>\n</li>\n<li>\n<p class=\"first-para\">Extended ACLs, which offer the ability to filter or control traffic based on a variety of criteria such as source or destination IP addresses, as well as protocol type such as, ICMP, TCP, UDP, or IP. These ACLs are numbered from 100–199 and from 2000–2699.</p>\n</li>\n</ul>\n<p>To create a standard ACL, you can use the following example which will create an ACL that allows traffic for the 192.168.8.0/24 network.</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1(config)<b>#access-list 50 permit 192.168.8.0 0.0.0.255</b></pre>\n<p>To create an extended ACL you can use the following example which will create an ACL that allows traffic with addresses in the 192.168.8.0/24 network and tcp ports of either 80 (http) or 443 (https):</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>access-list 101 remark This ACL is to control the outbound router traffic.</b>\r\nRouter1(config)#<b>access-list 101 permit tcp 192.168.8.0 0.0.0.255 any eq 80</b>\r\nRouter1(config)<b>#access-list 101 permit tcp 192.168.8.0 0.0.0.255 any eq 443</b></pre>\n<h2>Securing your Cisco network by applying an access control list</h2>\n<p>After you have created an Access Control List (ACL), such as ACL 101 created above, you can apply that ACL to an interface. In the following example, this ACL is placed to restrict outbound traffic on FastEthernet0/1.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>interface F</b><b>astEthernet0/1</b>\r\nRouter1(config-if)#<b>ip access-group 101 out</b></pre>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-03-01T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":208539},{"headers":{"creationTime":"2016-03-27T16:58:40+00:00","modifiedTime":"2022-02-28T19:35:56+00:00","timestamp":"2022-09-14T18:19:18+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"TCP/IP For Dummies Cheat Sheet","strippedTitle":"tcp/ip for dummies cheat sheet","slug":"tcpip-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"To be a master of TCP/IP, become familiar with security terms, general definitions, and Requests For Comment (RFCs).","noIndex":0,"noFollow":0},"content":"As a network administrator, you know that TCP/IP is the glue that holds the Internet and the Web together. As well as being familiar with security terms and general definitions, you need to pay attention to RFCs (Requests for Comment) published by the Internet Engineering Task Force. You can comment on, learn from, and submit RFCs yourself.","description":"As a network administrator, you know that TCP/IP is the glue that holds the Internet and the Web together. As well as being familiar with security terms and general definitions, you need to pay attention to RFCs (Requests for Comment) published by the Internet Engineering Task Force. You can comment on, learn from, and submit RFCs yourself.","blurb":"","authors":[{"authorId":10596,"name":"Candace Leiden","slug":"candace-leiden","description":" <b>Candace Leiden</b> consults on systems and database performance and instructional design for international courseware. <p><b>Marshall Wilensky</b> was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10596"}},{"authorId":10597,"name":"Marshall Wilensky","slug":"marshall-wilensky","description":" <b>Candace Leiden</b> consults on systems and database performance and instructional design for international courseware. <p><b>Marshall Wilensky</b> was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10597"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":196388,"title":"TCP/IP Definitions","slug":"tcpip-definitions","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196388"}},{"articleId":196385,"title":"Notable Requests for Comments of Interest to TCP/IP Users","slug":"notable-requests-for-comments-of-interest-to-tcpip-users","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196385"}},{"articleId":196387,"title":"Internet Security Terms and Tips to Use with TCP/IP","slug":"internet-security-terms-and-tips-to-use-with-tcpip","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196387"}},{"articleId":185407,"title":"Network Basics: TCP/IP Protocol Suite","slug":"network-basics-tcpip-protocol-suite","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185407"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281878,"slug":"tcp-ip-for-dummies-6th-edition","isbn":"9780470450604","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/0470450606-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/tcp-ip-for-dummies-6th-edition-cover-9780470450604-202x255.jpg","width":202,"height":255},"title":"TCP / IP For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<b data-author-id=\"10596\">Candace Leiden</b> consults on systems and database performance and instructional design for international courseware. <p><b data-author-id=\"10597\">Marshall Wilensky</b> was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.</p>","authors":[{"authorId":10596,"name":"Candace Leiden","slug":"candace-leiden","description":" <b>Candace Leiden</b> consults on systems and database performance and instructional design for international courseware. <p><b>Marshall Wilensky</b> was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10596"}},{"authorId":10597,"name":"Marshall Wilensky","slug":"marshall-wilensky","description":" <b>Candace Leiden</b> consults on systems and database performance and instructional design for international courseware. <p><b>Marshall Wilensky</b> was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10597"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470450604&quot;]}]\" id=\"du-slot-63221b2682812\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470450604&quot;]}]\" id=\"du-slot-63221b26832ae\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":196388,"title":"TCP/IP Definitions","slug":"tcpip-definitions","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196388"}},{"articleId":196387,"title":"Internet Security Terms and Tips to Use with TCP/IP","slug":"internet-security-terms-and-tips-to-use-with-tcpip","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196387"}},{"articleId":196385,"title":"Notable Requests for Comments of Interest to TCP/IP Users","slug":"notable-requests-for-comments-of-interest-to-tcpip-users","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196385"}}],"content":[{"title":"TCP/IP definitions","thumb":null,"image":null,"content":"<p>Knowing your way around TCP/IP is key if you want to manage a network successfully. The definitions in the following list explain the basics, such as what an IP address is, and they also clarify the various nets you deal with — extranets, intranet, and subnetting — as well other key terms.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>CIDR (Classless InterDomain Routing):</b> A way to conserve on IP addresses. An IP addressing design that replaces the traditional Class A, B, C structure, CIDR allows one IP address to represent many IP addresses. A CIDR address looks like a regular IP address with a “suffix” on the end, such as 192.200.0.0/12. The suffix is an <i>IP prefix</i>.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>extranet:</b> A private/public hybrid network that uses TCP/IP to share part of an intranet with an outside organization. An extranet is the part of an intranet that outsiders can access over the Internet. Be sure to have good security practices if you have an extranet.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>intranet:</b> An organization’s private network. If your intranet is built on TCP/IP protocols, applications, and services, it’s also an Internet.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>IP address:</b> The 32-bit (IPv4) or 128-bit (IPv6) numeric address for a computer. You must have an IP address to be connected to the Internet. An IP address consists of two parts: the network piece and the host piece. An IPv4 example: 127.0.0.1; an IPv6 example: 0:0:0:0:0:0:0:1 (::1 for short).</p>\n</li>\n<li>\n<p class=\"first-para\"><b>loopback address:</b> IP shorthand for you — actually, your computer. The loopback is a special IP address (127.0.0.1) that isn’t physically connected to any network hardware. You use it to test TCP/IP services and applications without worrying about hardware problems.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Network Address Translation (NAT):</b> Helps the Internet not run out of IP addresses by translating an IP address (perhaps not unique) on one network to another IP address on a different network — usually, the Internet. IPv6 does away with the need for NAT address help, but NAT, unintentionally, also provides firewall security.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>subnetting:</b> Dividing one large Internet into smaller networks (subnets) in which they all share the same network portion of an IP address.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>TCP/IP (Transmission Control Protocol/Internet Protocol):</b> The guts and the rules of the Internet and World Wide Web. A set of protocols, services, and applications for linking computers of all kinds.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Virtual private network (VPN):</b> A private network that runs over the public Internet. You can build a VPN at low cost by using the Internet (rather than your own system of private — and expensive — lines) with special security checks and a tunneling protocol. Companies are beginning to use a private virtual network for both extranets and wide-area intranets.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Voice over Internet Protocol (VoIP):</b> Are you spending too much on phone calls? Get rid of your phone service. You can make phone calls from anywhere to anywhere that has a computer, free VoIP software, and a fast Internet connection. Even better, it’s free. You can call from Buenos Aires to Nairobi for free with VoIP. It doesn’t have to be computer to computer, either. You can also use VoIP to call a regular telephone number.</p>\n</li>\n</ul>\n<p class=\"Tip\">Are you acronym challenged? If you don’t know what a particular acronym means, visit <a href=\"http://whatis.techtarget.com/\" target=\"_blank\" rel=\"noopener\">WhatIs?</a> where you can find thousands of definitions for Internet and security acronyms.</p>\n"},{"title":"Internet security terms and tips to use with TCP/IP","thumb":null,"image":null,"content":"<p>You’re a network administrator, so you know that keeping your Web site secure is an ongoing challenge. You don’t have to know that TCP/IP stands for Transmission Control Protocol/Internet Protocol to use it effectively, but knowing the terms in the following list can make you better able to deal with security issues.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>Advanced Encryption Standard</b>: A secret key cipher used for encryption.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>authentication:</b> Proving you are who you say you are. The simplest form of authentication, an unencrypted username-and-password challenge (“Who are you?” “James Bond.” “Okay, I believe you”), often isn’t reliable enough for the Internet. On the Internet, where hackers and crackers can fake or steal more than your username and password, trust no one. Require authentication for users, computers, and IP addresses to be secure.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>cipher</b>: A means used to encrypt data. A cipher transforms plain text into scrambled cipher text. You can’t decipher the coded cipher text back into plain text without using some kind of key. For example, AES and DES are examples of secret key block ciphers. The complete encryption algorithm is the cipher plus the technique.</p>\n</li>\n<li>\n<p class=\"first-para\"><a href=\"http://www.csrc.nist.gov\" target=\"_blank\" rel=\"noopener\"><b>Computer Security Resource Center</b></a><b>:</b> A Web site that contains security publications, alerts, and news, including documents from the U.S. Department of Defense on security architecture and trusted systems. Located at the U.S. National Institute of Standards and Technology Computer Security Resource Clearinghouse.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>digital certificate:</b> A special, secure file that guarantees your online identity. A digital certificate contains security information, including your name and e-mail address, your encryption key, the name of the Certificate Authority, and the length of the certificate’s validity. (“Who are you?” “James Bond.” “Can you prove your ID?”). A digital certificate is a popular way to perform authentication on the Internet.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>encryption: </b>Scrambling your data by applying a secret code so that no one can read it without using a key.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>IP Security (IPSec):</b> A set of TCP/IP protocols that provide authentication and encryption services, but on a lower layer than TLS.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>public key/private key:</b> A key exchange encryption scheme that uses two keys to encrypt and decrypt data. Anyone can use a public key to encrypt data before it goes across the Internet. Only the receiver has the private key needed to read the data. Pretty Good Privacy (PGP) uses public key/private key encryption methods.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Transport Layer Security (TLS), Secure Socket Layer (SSL):</b> TCP/IP protocols that guarantee privacy on a network by providing authentication and encryption. TLS and its nonstandard companion SSL ensure that your credit card information is safe when you bank or shop. TLS is newer and standard. SSL is still used more.</p>\n</li>\n</ul>\n"},{"title":"Notable requests for comments of interest to TCP/IP users","thumb":null,"image":null,"content":"<p>As a network administrator, you’re familiar with certain things — TCP/IP, security threats, and Requests for Comments, or RFCs. Published by the Internet Engineering Task Force, RFCs offer a chance for professionals to share information, present papers for review, and generally communicate amongst themselves. Some RFCs eventually get adopted as Internet standards.</p>\n<p>The following list contains RFCs that are especially interesting and/or useful:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">RFC 3271, “The Internet is for Everyone,” by V. Cerf</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2664, “FYI on Questions and Answers — Answers to Commonly Asked New Internet User Questions,” by R. Plzak, A. Wells, E. Krol</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2151, “A Primer on Internet and TCP/IP Tools and Utilities,” by G. Kessler, S. Shepard</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2504, “Users&#8217; Security Handbook,” by E. Guttman, L. Leong, G. Malkin</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 1244, “Site Security Handbook” (still useful after many years), by J.P. Holbrook, J.K. Reynolds</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 5485, “Digital Signatures on Internet-Draft Documents”</p>\n</li>\n</ul>\n<p>For laughs, scan these April Fool’s Day RFCs:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">RFC 3251, “Electricity over IP,” by B. Rajagopalan</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 1925, “The Twelve Networking Truths,” R. Callon, Editor</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2100, “The Naming of Hosts” (love the poetry!), by J. Ashworth</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2549, “IP over Avian Carriers with Quality of Service,” by D. Waitzman</p>\n</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-02-28T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":209488},{"headers":{"creationTime":"2022-02-03T21:22:52+00:00","modifiedTime":"2022-02-03T21:26:27+00:00","timestamp":"2022-09-14T18:19:05+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","strippedTitle":"windows server 2022 and powershell all-in-one for dummies cheat sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"This Cheat Sheet summarizes the key information related to the installation and operations of a Windows Server 2022 network.","noIndex":0,"noFollow":0},"content":"PowerShell 5.1 is the version of Windows PowerShell that ships with Windows Server 2022, Windows Server 2019, and Windows Server 2016. It’s available for installation on Windows Server 2008 R2 with Service Pack1, Windows Server 2012, and Windows Server 2012 R2. The last three operating systems must have Windows Management Framework 5.1 installed to support PowerShell 5.1.\r\n\r\nYou can upgrade to PowerShell 7.2 fairly easily (the more recent version from Microsoft), though the examples on this Cheat Sheet were only tested in PowerShell 5.1.","description":"PowerShell 5.1 is the version of Windows PowerShell that ships with Windows Server 2022, Windows Server 2019, and Windows Server 2016. It’s available for installation on Windows Server 2008 R2 with Service Pack1, Windows Server 2012, and Windows Server 2012 R2. The last three operating systems must have Windows Management Framework 5.1 installed to support PowerShell 5.1.\r\n\r\nYou can upgrade to PowerShell 7.2 fairly easily (the more recent version from Microsoft), though the examples on this Cheat Sheet were only tested in PowerShell 5.1.","blurb":"","authors":[{"authorId":24327,"name":"Sara Perrott","slug":"sara-perrott","description":" \t <p><b>Sara Perrott</b> is an information security professional with a systems and network engineering background. She teaches classes related to Windows Server, Amazon Web Services, networking, and virtualization. Sara addressed the AWS Imagine conference in 2018 and presented at the RSA conference in 2019. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/24327"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":290627,"slug":"windows-server-2022-and-powershell-all-in-one-for-dummies","isbn":"9781119867821","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119867827-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/9781119867821-203x255.jpg","width":203,"height":255},"title":"Windows Server 2022 & Powershell All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b><b data-author-id=\"24327\">Sara Perrott</b></b> is an information security professional with a systems and network engineering background. She teaches classes related to Windows Server, Amazon Web Services, networking, and virtualization. Sara addressed the AWS Imagine conference in 2018 and presented at the RSA conference in 2019.</p>","authors":[{"authorId":24327,"name":"Sara Perrott","slug":"sara-perrott","description":" \t <p><b>Sara Perrott</b> is an information security professional with a systems and network engineering background. She teaches classes related to Windows Server, Amazon Web Services, networking, and virtualization. Sara addressed the AWS Imagine conference in 2018 and presented at the RSA conference in 2019. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/24327"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119867821&quot;]}]\" id=\"du-slot-63221b192da42\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119867821&quot;]}]\" id=\"du-slot-63221b192e2f1\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/"}}],"content":[{"title":"Common administrative tasks","thumb":null,"image":null,"content":"<p>Most system administrators have some commands that they find useful on a daily basis. Here are some you’re sure to need.</p>\n<h3>Setting up for remote management</h3>\n<p>For setting up remote management on systems, there are two commands you need to be aware of.</p>\n<p>To start the WinRM service and create exceptions in the Windows Firewall, run the following:</p>\n<p>winrm quickconfig</p>\n<p>To configure the system to accept remote PowerShell commands via WS-MAN, run the following:</p>\n<p>Enable-PSRemoting</p>\n<h3>Disabling sconfig at startup on Windows Server Core</h3>\n<p>If you’ve worked with Windows Server Core, you’re probably familiar with sconfig, the configuration utility. It’s the first screen you see after you log in to a Windows Server Core system. You may want to disable this menu from coming up after login, and you can do so by typing the following and pressing the Enter key:</p>\n<p>Set-SConfig -AutoLaunch $false</p>\n<p>That’s all there is to it! If you change your mind and you decide you want it to launch again after login, simply type the following and press Enter:</p>\n<p>Set-SConfig -AutoLaunch $true</p>\n<h3>Using environmental variables</h3>\n<p>To view available environmental variables, run the following:</p>\n<p>Set | More</p>\n<p>To add a folder named Tools to a path variable so you can run those tools without having to be in that directory, run the following:</p>\n<p>SET PATH=%PATH%;C:\\Tools</p>\n<p>To view your current path variable settings, type the following:</p>\n<p>echo %PATH%</p>\n<h3>Enabling/disabling the firewall</h3>\n<p>Here’s the command to disable the firewall for all profiles:</p>\n<p>Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False</p>\n<p>To re-enable the firewall for all profiles, use the following:</p>\n<p>Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled True</p>\n"},{"title":"Working with containers","thumb":null,"image":null,"content":"<p>Containers are the new technology trend, especially as the world shift toward microservices. Here are some helpful Docker commands:</p>\n<ul>\n<li><strong>docker login:</strong> Logs you into a DockerHub repository.</li>\n<li><strong>docker pull mcr.microsoft.com/windows/nanoserver:ltsc2022: </strong>Retrieves container images. In this case, it pulls from the mcr.microsoft.com/windows repository and retrieves the nanoserver image with the tag ltsc2022.</li>\n</ul>\n<p class=\"article-tips tip\">The nanoserver container images no longer use the latest tag so you’ll have to specify which container image tag you want. You can look up available tags on the container image’s page on Docker Hub.</p>\n<ul>\n<li><strong>docker ps:</strong> Shows all running containers. To view all containers, including those not running, simply add -a to the end of the command.</li>\n<li><strong>docker build &lt;dockerfile&gt;:</strong> Builds a container from a Dockerfile.</li>\n<li><strong>docker run:</strong> Starts a container utilizing various arguments.</li>\n<li><strong>docker volume create:</strong> Creates a named volume.</li>\n<li><strong>docker container prune:</strong> Removes stopped containers.</li>\n</ul>\n"},{"title":"Troubleshooting with the command prompt","thumb":null,"image":null,"content":"<p>&nbsp;</p>\n<table>\n<thead>\n<tr>\n<td><strong>Name</strong></td>\n<td width=\"91\"><strong>Command</strong></td>\n<td width=\"444\"><strong>Description</strong></td>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>System File Checker</td>\n<td width=\"91\">sfc /scannow</td>\n<td width=\"444\">This utility checks system files to see if they match what’s expected by comparing the signature of the system file on the server with the signature of a cached copy of the same file. The cached files are stored in a compressed folder located at C:\\Windows\\System32\\dllcache. If a corrupt system file is found, it’s replaced.</td>\n</tr>\n<tr>\n<td>Check Disk</td>\n<td width=\"91\">chkdsk /f /r</td>\n<td width=\"444\">This utility repairs file system errors and marks bad sectors so the operating system doesn’t use them anymore. The /f tells the utility to fix any issues it finds, and the /r locates the bad <em>sectors</em> (areas) on the disk. This can take a while. Kick it off, and grab a cup of coffee.</td>\n</tr>\n<tr>\n<td>Driverquery</td>\n<td width=\"91\">driverquery</td>\n<td width=\"444\">This utility queries the system for all the hardware drivers that are installed on Windows. This can be very helpful if you’re running into issues with systems that have similar hardware and you want to know if they have a driver in common.</td>\n</tr>\n<tr>\n<td>BCDEdit</td>\n<td width=\"91\">bcdedit</td>\n<td width=\"444\">Allows you to edit the boot configuration on your Windows server.</td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-02-03T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":290654},{"headers":{"creationTime":"2016-03-26T14:44:49+00:00","modifiedTime":"2021-12-27T21:14:42+00:00","timestamp":"2022-09-14T18:18:57+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Network Administration: Granting Share Permissions","strippedTitle":"network administration: granting share permissions","slug":"network-administration-granting-share-permissions","canonicalUrl":"","seo":{"metaDescription":"When you first create a file share on your network, all users are granted read-only access to the share. If you want to allow users to modify files in the share","noIndex":0,"noFollow":0},"content":"When you first create a file share on your network, all users are granted read-only access to the share. If you want to allow users to modify files in the share or allow them to create new files, you need to add permissions. Here’s how to do this using Windows Explorer:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Open Windows Explorer by pressing the Windows key and clicking Computer; then browse to the folder whose permissions you want to manage.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Right-click the folder you want to manage and then choose Properties from the contextual menu.</p>\r\n<p class=\"child-para\">The Properties dialog box for the folder appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Sharing tab; then click Advanced Sharing.</p>\r\n<p class=\"child-para\">The Advanced Sharing dialog box appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click Permissions.</p>\r\n<p class=\"child-para\">The dialog box shown appears. This dialog box lists all the users and groups to whom you’ve granted permission for the folder. Initially, read permissions are granted to a group called Everyone, which means that anyone can view files in the share but no one can create, modify, or delete files in the share.</p>\r\n<p class=\"child-para\">When you select a user or group from the list, the check boxes at the bottom of the list change to indicate which specific permissions you’ve assigned to each user or group.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380583.image0.jpg\" alt=\"image0.jpg\" width=\"330\" height=\"400\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Add button.</p>\r\n<p class=\"child-para\">The dialog box shown appears.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380584.image1.jpg\" alt=\"image1.jpg\" width=\"535\" height=\"293\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Enter the name of the user or group to whom you want to grant permission and then click OK.</p>\r\n<p class=\"child-para\">If you’re not sure of the name, click the Advanced button. This action brings up a dialog box from which you can search for existing users.</p>\r\n<p class=\"child-para\">When you click OK, you return to the Share Permissions tab, with the new user or group added.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Select the appropriate Allow and Deny check boxes to specify which permissions to allow for the user or group.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Repeat Steps 5–7 for any other permissions that you want to add.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">When you’re done, click OK.</p>\r\n</li>\r\n</ol>\r\nHere are a few other thoughts to ponder concerning adding permissions:\r\n\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">If you want to grant full access to everyone for this folder, don’t bother adding another permission. Instead, select the Everyone group and then select the Allow check box for each permission type.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">You can remove a permission by selecting the permission and then clicking the Remove button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">If you’d rather not fuss with the Share and Storage Management console, you can set the permissions from My Computer. Right-click the shared folder, choose Sharing and Security from the contextual menu, and then click Permissions. Then you can follow the preceding procedure, picking up at Step 5.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is most restrictive always applies. If the share permissions grant a user Full Control permission but the folder permission grants the user only Read permission, for example, the user has only Read permission for the folder.</p>\r\n</li>\r\n</ul>","description":"When you first create a file share on your network, all users are granted read-only access to the share. If you want to allow users to modify files in the share or allow them to create new files, you need to add permissions. Here’s how to do this using Windows Explorer:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Open Windows Explorer by pressing the Windows key and clicking Computer; then browse to the folder whose permissions you want to manage.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Right-click the folder you want to manage and then choose Properties from the contextual menu.</p>\r\n<p class=\"child-para\">The Properties dialog box for the folder appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Sharing tab; then click Advanced Sharing.</p>\r\n<p class=\"child-para\">The Advanced Sharing dialog box appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click Permissions.</p>\r\n<p class=\"child-para\">The dialog box shown appears. This dialog box lists all the users and groups to whom you’ve granted permission for the folder. Initially, read permissions are granted to a group called Everyone, which means that anyone can view files in the share but no one can create, modify, or delete files in the share.</p>\r\n<p class=\"child-para\">When you select a user or group from the list, the check boxes at the bottom of the list change to indicate which specific permissions you’ve assigned to each user or group.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380583.image0.jpg\" alt=\"image0.jpg\" width=\"330\" height=\"400\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Add button.</p>\r\n<p class=\"child-para\">The dialog box shown appears.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380584.image1.jpg\" alt=\"image1.jpg\" width=\"535\" height=\"293\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Enter the name of the user or group to whom you want to grant permission and then click OK.</p>\r\n<p class=\"child-para\">If you’re not sure of the name, click the Advanced button. This action brings up a dialog box from which you can search for existing users.</p>\r\n<p class=\"child-para\">When you click OK, you return to the Share Permissions tab, with the new user or group added.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Select the appropriate Allow and Deny check boxes to specify which permissions to allow for the user or group.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Repeat Steps 5–7 for any other permissions that you want to add.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">When you’re done, click OK.</p>\r\n</li>\r\n</ol>\r\nHere are a few other thoughts to ponder concerning adding permissions:\r\n\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">If you want to grant full access to everyone for this folder, don’t bother adding another permission. Instead, select the Everyone group and then select the Allow check box for each permission type.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">You can remove a permission by selecting the permission and then clicking the Remove button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">If you’d rather not fuss with the Share and Storage Management console, you can set the permissions from My Computer. Right-click the shared folder, choose Sharing and Security from the contextual menu, and then click Permissions. Then you can follow the preceding procedure, picking up at Step 5.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is most restrictive always applies. If the share permissions grant a user Full Control permission but the folder permission grants the user only Read permission, for example, the user has only Read permission for the folder.</p>\r\n</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe</b> is the bestselling author of more than 40 <i>For Dummies</i> books. He's covered everything from Microsoft Office to creating web pages to technologies such as Java and ASP.NET, and has written several editions of both <i>PowerPoint For Dummies</i> and <i>Networking For Dummies.</i></p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe</b> is the bestselling author of more than 40 <i>For Dummies</i> books. He's covered everything from Microsoft Office to creating web pages to technologies such as Java and ASP.NET, and has written several editions of both <i>PowerPoint For Dummies</i> and <i>Networking For Dummies.</i></p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-63221b11aa940\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-63221b11ab330\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":164953},{"headers":{"creationTime":"2016-08-17T12:34:25+00:00","modifiedTime":"2021-12-27T18:59:16+00:00","timestamp":"2022-09-14T18:18:57+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Using Workgroup Templates Across Your Network","strippedTitle":"using workgroup templates across your network","slug":"using-workgroup-templates-across-network","canonicalUrl":"","seo":{"metaDescription":"Although an occasional sacrifice to the Office gods may make your networking life a bit easier, a template isn’t a place of worship. Rather, a template is a spe","noIndex":0,"noFollow":0},"content":"Although an occasional sacrifice to the Office gods may make your networking life a bit easier, a template isn’t a place of worship. Rather, a <em>template</em> is a special type of document file that holds formatting information, boilerplate text, and other customized settings that you can use as the basis for new documents.\r\n\r\nThree Office programs — Word, Excel, and PowerPoint — enable you to specify a template whenever you create a new document. When you create a new document in Word, Excel, or PowerPoint by choosing File → New, you see a dialog box that lets you choose a template for the new document.\r\n\r\nOffice comes with a set of templates for the most common types of documents. These templates are grouped under the various tabs that appear across the top of the New dialog box.\r\n\r\nIn addition to the templates that come with Office, you can create your own templates in Word, Excel, and PowerPoint. Creating your own templates is especially useful if you want to establish a consistent look for documents prepared by your network users. For example, you can create a Letter template that includes your company’s letterhead or a Proposal template that includes a company logo.\r\n\r\nOffice enables you to store templates in two locations. Where you put them depends on what you want to do with them:\r\n<ul>\r\n \t<li><strong>The User Templates folder on each user’s local disk drive:</strong> If a particular user needs a specialized template, put it here.</li>\r\n \t<li><strong>The Workgroup Templates folder on a shared network drive:</strong> If you have templates that you want to make available to all network users on the network server, put them here. This arrangement still allows each user to create templates that aren’t available to other network users.</li>\r\n</ul>\r\nWhen you use both a User Templates folder and a Workgroup Templates folder, Office combines the templates from both folders and lists them in alphabetical order in the New dialog box. For example, the User Templates folder may contain templates named Blank Document and web Page, and the Workgroup Templates folder may contain a template named Company Letterhead. In this case, three templates appear in the New dialog box, in this order: Blank Document, Company Letterhead, and web Page.\r\n\r\nTo set the location of the User Templates and Workgroup Templates folders, follow these steps in Microsoft Word:\r\n<ol>\r\n \t<li>In Word, create a new document or open an existing document. It doesn't matter which document you use. This step is required simply because word doesn't let you access the template folder locations unless a document is open.</li>\r\n \t<li>Choose File, and then Options. The Word Options dialog box opens.</li>\r\n \t<li>Click the Advanced tab. The Advanced options appear.</li>\r\n \t<li>Scroll down to the General section and then click the File Locations button. The File Locations dialog box appears.\r\n\r\n[caption id=\"attachment_222302\" align=\"aligncenter\" width=\"535\"]<a href=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\"><img class=\"wp-image-222302 size-full\" src=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\" alt=\"file locations\" width=\"535\" height=\"403\" /></a> Setting the file locations.[/caption]</li>\r\n \t<li class=\"NumListItem\">Double-click the Workgroup Templates item. This step opens a dialog box that lets you browse to the location of your template files.</li>\r\n \t<li class=\"NumListItem\">Browse to the template files and then click OK. You return to the File Locations dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK to dismiss the File Locations dialog box. You return to the Word Options dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK again. The Word Options dialog box is dismissed.</li>\r\n</ol>\r\n<p class=\"article-tips tip\">Although the User Templates and Workgroup Templates settings affect Word, Excel, and PowerPoint, you can change these settings only from Word. The Options dialog boxes in Excel and PowerPoint don’t show the User Templates or Workgroup Templates options.</p>\r\nWhen you install Office, the standard templates that come with Office are copied into a folder on the computer’s local disk drive, and the User Templates option is set to this folder. The Workgroup Templates option is left blank. You can set the Workgroup Templates folder to a shared network folder by clicking Network Templates, clicking the Modify button, and specifying a shared network folder that contains your workgroup templates.","description":"Although an occasional sacrifice to the Office gods may make your networking life a bit easier, a template isn’t a place of worship. Rather, a <em>template</em> is a special type of document file that holds formatting information, boilerplate text, and other customized settings that you can use as the basis for new documents.\r\n\r\nThree Office programs — Word, Excel, and PowerPoint — enable you to specify a template whenever you create a new document. When you create a new document in Word, Excel, or PowerPoint by choosing File → New, you see a dialog box that lets you choose a template for the new document.\r\n\r\nOffice comes with a set of templates for the most common types of documents. These templates are grouped under the various tabs that appear across the top of the New dialog box.\r\n\r\nIn addition to the templates that come with Office, you can create your own templates in Word, Excel, and PowerPoint. Creating your own templates is especially useful if you want to establish a consistent look for documents prepared by your network users. For example, you can create a Letter template that includes your company’s letterhead or a Proposal template that includes a company logo.\r\n\r\nOffice enables you to store templates in two locations. Where you put them depends on what you want to do with them:\r\n<ul>\r\n \t<li><strong>The User Templates folder on each user’s local disk drive:</strong> If a particular user needs a specialized template, put it here.</li>\r\n \t<li><strong>The Workgroup Templates folder on a shared network drive:</strong> If you have templates that you want to make available to all network users on the network server, put them here. This arrangement still allows each user to create templates that aren’t available to other network users.</li>\r\n</ul>\r\nWhen you use both a User Templates folder and a Workgroup Templates folder, Office combines the templates from both folders and lists them in alphabetical order in the New dialog box. For example, the User Templates folder may contain templates named Blank Document and web Page, and the Workgroup Templates folder may contain a template named Company Letterhead. In this case, three templates appear in the New dialog box, in this order: Blank Document, Company Letterhead, and web Page.\r\n\r\nTo set the location of the User Templates and Workgroup Templates folders, follow these steps in Microsoft Word:\r\n<ol>\r\n \t<li>In Word, create a new document or open an existing document. It doesn't matter which document you use. This step is required simply because word doesn't let you access the template folder locations unless a document is open.</li>\r\n \t<li>Choose File, and then Options. The Word Options dialog box opens.</li>\r\n \t<li>Click the Advanced tab. The Advanced options appear.</li>\r\n \t<li>Scroll down to the General section and then click the File Locations button. The File Locations dialog box appears.\r\n\r\n[caption id=\"attachment_222302\" align=\"aligncenter\" width=\"535\"]<a href=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\"><img class=\"wp-image-222302 size-full\" src=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\" alt=\"file locations\" width=\"535\" height=\"403\" /></a> Setting the file locations.[/caption]</li>\r\n \t<li class=\"NumListItem\">Double-click the Workgroup Templates item. This step opens a dialog box that lets you browse to the location of your template files.</li>\r\n \t<li class=\"NumListItem\">Browse to the template files and then click OK. You return to the File Locations dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK to dismiss the File Locations dialog box. You return to the Word Options dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK again. The Word Options dialog box is dismissed.</li>\r\n</ol>\r\n<p class=\"article-tips tip\">Although the User Templates and Workgroup Templates settings affect Word, Excel, and PowerPoint, you can change these settings only from Word. The Options dialog boxes in Excel and PowerPoint don’t show the User Templates or Workgroup Templates options.</p>\r\nWhen you install Office, the standard templates that come with Office are copied into a folder on the computer’s local disk drive, and the User Templates option is set to this folder. The Workgroup Templates option is left blank. You can set the Workgroup Templates folder to a shared network folder by clicking Network Templates, clicking the Modify button, and specifying a shared network folder that contains your workgroup templates.","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe</b> is the bestselling author of more than 40 <i>For Dummies</i> books. He's covered everything from Microsoft Office to creating web pages to technologies such as Java and ASP.NET, and has written several editions of both <i>PowerPoint For Dummies</i> and <i>Networking For Dummies.</i></p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}},{"articleId":184875,"title":"The Many Types of Firewalls on a Network","slug":"the-many-types-of-firewalls-on-a-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/184875"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe</b> is the bestselling author of more than 40 <i>For Dummies</i> books. He's covered everything from Microsoft Office to creating web pages to technologies such as Java and ASP.NET, and has written several editions of both <i>PowerPoint For Dummies</i> and <i>Networking For Dummies.</i></p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-63221b1190612\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-63221b1190ed6\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-11-17T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":222301}],"_links":{"self":{"self":"https://dummies-api.dummies.com/v2/categories/33585/categoryArticles?sortField=time&sortOrder=1&size=10&offset=0"},"next":{"self":"https://dummies-api.dummies.com/v2/categories/33585/categoryArticles?sortField=time&sortOrder=1&size=10&offset=10"},"last":{"self":"https://dummies-api.dummies.com/v2/categories/33585/categoryArticles?sortField=time&sortOrder=1&size=10&offset=147"}}},"objectTitle":"","status":"success","pageType":"article-category","objectId":"33585","page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{"categoriesFilter":[{"itemId":0,"itemName":"All Categories","count":155}],"articleTypeFilter":[{"articleType":"All Types","count":155},{"articleType":"Articles","count":140},{"articleType":"Cheat Sheet","count":4},{"articleType":"Step by Step","count":10},{"articleType":"Videos","count":1}]},"filterDataLoadedStatus":"success","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2025-04-17T15:50:01+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"https://cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"https://sb\" : \"http://b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"https://sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"https://zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for http://www.dummies.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'https://static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"https://www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"navigationState":{"navigationCollections":[{"collectionId":287568,"title":"BYOB (Be Your Own Boss)","hasSubCategories":false,"url":"/collection/for-the-entry-level-entrepreneur-287568"},{"collectionId":293237,"title":"Be a Rad Dad","hasSubCategories":false,"url":"/collection/be-the-best-dad-293237"},{"collectionId":295890,"title":"Career Shifting","hasSubCategories":false,"url":"/collection/career-shifting-295890"},{"collectionId":294090,"title":"Contemplating the Cosmos","hasSubCategories":false,"url":"/collection/theres-something-about-space-294090"},{"collectionId":287563,"title":"For Those Seeking Peace of Mind","hasSubCategories":false,"url":"/collection/for-those-seeking-peace-of-mind-287563"},{"collectionId":287570,"title":"For the Aspiring Aficionado","hasSubCategories":false,"url":"/collection/for-the-bougielicious-287570"},{"collectionId":291903,"title":"For the Budding Cannabis Enthusiast","hasSubCategories":false,"url":"/collection/for-the-budding-cannabis-enthusiast-291903"},{"collectionId":299891,"title":"For the College Bound","hasSubCategories":false,"url":"/collection/for-the-college-bound-299891"},{"collectionId":291934,"title":"For the Exam-Season Crammer","hasSubCategories":false,"url":"/collection/for-the-exam-season-crammer-291934"},{"collectionId":301547,"title":"For the Game Day Prepper","hasSubCategories":false,"url":"/collection/big-game-day-prep-made-easy-301547"}],"navigationCollectionsLoadedStatus":"success","navigationCategories":{"books":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/books/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/books/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/books/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/books/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/books/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/books/level-0-category-0"}},"articles":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/articles/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/articles/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/articles/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/articles/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/articles/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/articles/level-0-category-0"}}},"navigationCategoriesLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":[],"relatedArticlesStatus":"initial"},"routeState":{"name":"ArticleCategory","path":"/category/articles/general-networking-33585/","hash":"","query":{},"params":{"category":"general-networking-33585"},"fullPath":"/category/articles/general-networking-33585/","meta":{"routeType":"category","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"profileState":{"auth":{},"userOptions":{},"status":"success"}}
Logo
  • Articles Open Article Categories
  • Books Open Book Categories
  • Collections Open Collections list
  • Custom Solutions

Article Categories

Book Categories

Collections

Explore all collections
BYOB (Be Your Own Boss)
Be a Rad Dad
Career Shifting
Contemplating the Cosmos
For Those Seeking Peace of Mind
For the Aspiring Aficionado
For the Budding Cannabis Enthusiast
For the College Bound
For the Exam-Season Crammer
For the Game Day Prepper
Log In
  • Home
  • Technology Articles
  • Information Technology Articles
  • Networking Articles
  • General Networking Articles

General Networking Articles

From virtual networks to GIS and IT architecture, our networking articles take a bunch of acronyms and make 'em understandable to the average human.

Articles From General Networking

page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16

Filter Results

157 results
157 results
General Networking Configuring Network Connections for Windows 10

Step by Step / Updated 10-28-2024

Windows usually detects the presence of a network adapter automatically; typically, you don’t have to install device drivers manually for the adapter. When Windows detects a network adapter, Windows automatically creates a network connection and configures it to support basic networking protocols. You may need to change the configuration of a network connection manually, however. The following steps show you how to configure your network adapter on a Windows 10 system:

View Step by Step
General Networking The 2 Pillars of Cybersecurity

Article / Updated 08-31-2023

As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity plan: Prevention: The first pillar of cybersecurity is technology that you can deploy to prevent bad actors from penetrating your network and stealing or damaging your data. This technology includes firewalls that block unwelcome access, antivirus programs that detect malicious software, patch management tools that keep your software up to date, and antispam programs that keep suspicious email from reaching your users’ inboxes. The most important part of the prevention pillar is the human firewall. Technology can only go so far in preventing successful cyber attacks. Most successful attacks are the result of users opening email attachments or clicking web links that they should have known were dangerous. Thus, in addition to providing technology to prevent attacks, you also need to make sure your users know how to spot and avoid suspicious email attachments and web links. Recovery: The second pillar of cybersecurity is necessary because the first pillar isn’t always successful. Successful cyber attacks are inevitable, so you need to have technology and plans in place to quickly recover from them when you do.

View Article
General Networking Securing the Human Firewall

Article / Updated 08-31-2023

Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with the most difficult job of network security: securing your network’s users. All the best-laid security plans are for naught if your users write down their passwords on sticky notes and post them on their computers and click every link that shows up in their email. The key to securing your network users is to empower your users to realize that they’re an important part of your company’s cybersecurity plan, and then show them what they can do to become an effective human firewall. This necessarily involves training, and of course IT training is usually the most dreaded type of training there is. So, do your best to make the training fun and engaging rather than dull and boring. If training isn’t your thing, search the web. You’ll find plenty of inexpensive options for online cybersecurity training, ranging from simple and short videos to full-length online courses. You’ll also need to establish a written cybersecurity policy and stick to it. Have a meeting with everyone to go over the security policy to make sure that everyone understands the rules. Also, make sure to have consequences when violations occur. Here are some suggestions for some basic security rules you can incorporate into your security policy: Never write down your password or give it to someone else. Accounts should not be shared. Never use someone else’s account to access a resource that you can’t access under your own account. If you need access to some network resource that isn’t available to you, you should formally request access under your own account. Likewise, never give your account information to a co-worker so that he or she can access a needed resource. Your co-worker should instead formally request access under his or her own account. Don’t install any software or hardware on your computer — especially wireless access devices or modems — without first obtaining permission. Don’t enable file and printer sharing on workstations without first getting permission. Never attempt to disable or bypass the network’s security features.

View Article
General Networking Useful Websites for Networking Information

Article / Updated 09-30-2022

As a network administrator, the Internet is your best friend for networking resources, solutions, news, and guidance. Here are some websites for you to visit often. To register domains: InterNIC Network Solutions register.com To check your TCP/IP configuration: DNSstuff To see if your email server has been blocklisted: DNSBL.info To stay current in the industry, try these standards organizations: Institute of Electrical and Electronics Engineers International Organization for Standardization Internet Engineering Task Force Internet Society

View Article
General Networking Network Basics: TCP/IP Protocol Suite

Article / Updated 08-01-2022

Transmission control protocol/Internet protocol (TCP/IP), the protocol on which the Internet is built, is actually not a single protocol but rather an entire suite of related protocols. TCP is even older than Ethernet. It was first conceived in 1969 by the Department of Defense. Currently, the Internet Engineering Task Force, or IETF, manages the TCP/IP protocol suite. The TCP/IP suite is based on a four-layer model of networking that is similar to the seven-layer open systems interconnection (OSI) model. The following illustration shows how the TCP/IP model matches up with the OSI model and where some of the key TCP/IP protocols fit into the model. As you can see, the lowest layer of the model, the Network Interface layer, corresponds to the OSI model’s Physical and Data Link layers. TCP/IP can run over a wide variety of Network Interface layer protocols, including Ethernet, as well as other protocols, such as Token Ring and FDDI (an older standard for fiber-optic networks). The Application layer of the TCP/IP model corresponds to the upper three layers of the OSI model — that is, the Session, Presentation, and Application layers. Many protocols can be used at this level. A few of the most popular are HTTP, FTP, Telnet, SMTP, DNS, and SNMP. IP IP is a network layer protocol that is responsible for delivering packets to network devices. The IP protocol uses logical IP addresses to refer to individual devices rather than physical (MAC) addresses. A protocol called ARP (for address resolution protocol) handles the task of converting IP addresses to MAC addresses. Because IP addresses consist of a network part and a host part, IP is a routable protocol. As a result, IP can forward a packet to another network if the host is not on the current network. (The ability to route packets across networks is where IP gets its name. An Internet is a series of two or more connected TCP/IP networks that can be reached by routing.) TCP TCP is a connection-oriented transport layer protocol. TCP lets a device reliably send a packet to another device on the same network or on a different network. TCP ensures that each packet is delivered if at all possible. It does so by establishing a connection with the receiving device and then sending the packets. If a packet doesn’t arrive, TCP resends the packet. The connection is closed only after the packet has been successfully delivered or an unrecoverable error condition has occurred. One key aspect of TCP is that it’s always used for one-to-one communications. In other words, TCP allows a single network device to exchange data with another single network device. TCP isn’t used to broadcast messages to multiple network recipients. Instead, the user datagram protocol (UDP) is used for that purpose. Many well-known application layer protocols rely on TCP. For example, when a web browser requests a page, the browser uses HTTP to send a request via TCP to the web server. When the web server receives the request, it uses HTTP to fulfill the request, again via TCP. Other Application layer protocols that use TCP include Telnet (for terminal emulation), FTP (for file exchange), and SMTP (for e-mail). UDP The user datagram protocol is a connectionless transport layer protocol that is used when the overhead of a connection isn't required. After UDP has placed a packet on the network (via the IP protocol), it forgets about it. UDP doesn't guarantee that the packet actually arrives at its destination. Most applications that use UDP simply wait for any replies expected as a result of packets sent via UDP. If a reply doesn't arrive within a certain period of time, the application either sends the packet again or gives up. Probably the best-known application layer protocol that uses UDP is the domain name system (DNS). When an application needs to access a domain name such as www.dummies.com, DNS sends a UDP packet to a DNS server to look up the domain. When the server finds the domain, it returns the domain's IP address in another UDP packet.

View Article
General Networking Cisco Networking All-in-One For Dummies Cheat Sheet

Cheat Sheet / Updated 03-01-2022

To create and configure a Cisco network, you need to know about routers and switches to develop and manage secure Cisco systems. Become acquainted with Cisco network devices and code listings; and find out how to manage static routing and view routing information.

View Cheat Sheet
General Networking TCP/IP For Dummies Cheat Sheet

Cheat Sheet / Updated 02-28-2022

As a network administrator, you know that TCP/IP is the glue that holds the Internet and the Web together. As well as being familiar with security terms and general definitions, you need to pay attention to RFCs (Requests for Comment) published by the Internet Engineering Task Force. You can comment on, learn from, and submit RFCs yourself.

View Cheat Sheet
General Networking Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet

Cheat Sheet / Updated 02-03-2022

PowerShell 5.1 is the version of Windows PowerShell that ships with Windows Server 2022, Windows Server 2019, and Windows Server 2016. It’s available for installation on Windows Server 2008 R2 with Service Pack1, Windows Server 2012, and Windows Server 2012 R2. The last three operating systems must have Windows Management Framework 5.1 installed to support PowerShell 5.1. You can upgrade to PowerShell 7.2 fairly easily (the more recent version from Microsoft), though the examples on this Cheat Sheet were only tested in PowerShell 5.1.

View Cheat Sheet
General Networking Network Administration: Granting Share Permissions

Article / Updated 12-27-2021

When you first create a file share on your network, all users are granted read-only access to the share. If you want to allow users to modify files in the share or allow them to create new files, you need to add permissions. Here’s how to do this using Windows Explorer: Open Windows Explorer by pressing the Windows key and clicking Computer; then browse to the folder whose permissions you want to manage. Right-click the folder you want to manage and then choose Properties from the contextual menu. The Properties dialog box for the folder appears. Click the Sharing tab; then click Advanced Sharing. The Advanced Sharing dialog box appears. Click Permissions. The dialog box shown appears. This dialog box lists all the users and groups to whom you’ve granted permission for the folder. Initially, read permissions are granted to a group called Everyone, which means that anyone can view files in the share but no one can create, modify, or delete files in the share. When you select a user or group from the list, the check boxes at the bottom of the list change to indicate which specific permissions you’ve assigned to each user or group. Click the Add button. The dialog box shown appears. Enter the name of the user or group to whom you want to grant permission and then click OK. If you’re not sure of the name, click the Advanced button. This action brings up a dialog box from which you can search for existing users. When you click OK, you return to the Share Permissions tab, with the new user or group added. Select the appropriate Allow and Deny check boxes to specify which permissions to allow for the user or group. Repeat Steps 5–7 for any other permissions that you want to add. When you’re done, click OK. Here are a few other thoughts to ponder concerning adding permissions: If you want to grant full access to everyone for this folder, don’t bother adding another permission. Instead, select the Everyone group and then select the Allow check box for each permission type. You can remove a permission by selecting the permission and then clicking the Remove button. If you’d rather not fuss with the Share and Storage Management console, you can set the permissions from My Computer. Right-click the shared folder, choose Sharing and Security from the contextual menu, and then click Permissions. Then you can follow the preceding procedure, picking up at Step 5. The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is most restrictive always applies. If the share permissions grant a user Full Control permission but the folder permission grants the user only Read permission, for example, the user has only Read permission for the folder.

View Article
General Networking Using Workgroup Templates Across Your Network

Article / Updated 12-27-2021

Although an occasional sacrifice to the Office gods may make your networking life a bit easier, a template isn’t a place of worship. Rather, a template is a special type of document file that holds formatting information, boilerplate text, and other customized settings that you can use as the basis for new documents. Three Office programs — Word, Excel, and PowerPoint — enable you to specify a template whenever you create a new document. When you create a new document in Word, Excel, or PowerPoint by choosing File → New, you see a dialog box that lets you choose a template for the new document. Office comes with a set of templates for the most common types of documents. These templates are grouped under the various tabs that appear across the top of the New dialog box. In addition to the templates that come with Office, you can create your own templates in Word, Excel, and PowerPoint. Creating your own templates is especially useful if you want to establish a consistent look for documents prepared by your network users. For example, you can create a Letter template that includes your company’s letterhead or a Proposal template that includes a company logo. Office enables you to store templates in two locations. Where you put them depends on what you want to do with them: The User Templates folder on each user’s local disk drive: If a particular user needs a specialized template, put it here. The Workgroup Templates folder on a shared network drive: If you have templates that you want to make available to all network users on the network server, put them here. This arrangement still allows each user to create templates that aren’t available to other network users. When you use both a User Templates folder and a Workgroup Templates folder, Office combines the templates from both folders and lists them in alphabetical order in the New dialog box. For example, the User Templates folder may contain templates named Blank Document and web Page, and the Workgroup Templates folder may contain a template named Company Letterhead. In this case, three templates appear in the New dialog box, in this order: Blank Document, Company Letterhead, and web Page. To set the location of the User Templates and Workgroup Templates folders, follow these steps in Microsoft Word: In Word, create a new document or open an existing document. It doesn't matter which document you use. This step is required simply because word doesn't let you access the template folder locations unless a document is open. Choose File, and then Options. The Word Options dialog box opens. Click the Advanced tab. The Advanced options appear. Scroll down to the General section and then click the File Locations button. The File Locations dialog box appears. Double-click the Workgroup Templates item. This step opens a dialog box that lets you browse to the location of your template files. Browse to the template files and then click OK. You return to the File Locations dialog box. Click OK to dismiss the File Locations dialog box. You return to the Word Options dialog box. Click OK again. The Word Options dialog box is dismissed. Although the User Templates and Workgroup Templates settings affect Word, Excel, and PowerPoint, you can change these settings only from Word. The Options dialog boxes in Excel and PowerPoint don’t show the User Templates or Workgroup Templates options. When you install Office, the standard templates that come with Office are copied into a folder on the computer’s local disk drive, and the User Templates option is set to this folder. The Workgroup Templates option is left blank. You can set the Workgroup Templates folder to a shared network folder by clicking Network Templates, clicking the Modify button, and specifying a shared network folder that contains your workgroup templates.

View Article
page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16

Quick Links

  • About For Dummies
  • Contact Us
  • Activate Online Content

Connect

About Dummies

Dummies has always stood for taking on complex concepts and making them easy to understand. Dummies helps everyone be more knowledgeable and confident in applying what they know. Whether it's to pass that big test, qualify for that big promotion or even master that cooking technique; people who rely on dummies, rely on it to learn the critical skills and relevant information necessary for success.

Copyright @ 2000-2024 by John Wiley & Sons, Inc., or related companies. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.

Terms of Use
Privacy Policy
Cookies Settings
Do Not Sell My Personal Info - CA Only