{"appState":{"pageLoadApiCallsStatus":true},"categoryState":{"relatedCategories":{"headers":{"timestamp":"2022-05-23T18:31:22+00:00"},"categoryId":33585,"data":{"title":"General (Networking)","slug":"general-networking","image":{"src":null,"width":0,"height":0},"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"parentCategory":{"categoryId":33581,"title":"Networking","slug":"networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"}},"childCategories":[],"description":"From virtual networks to GIS and IT architecture, our networking articles take a bunch of acronyms and make 'em understandable to the average human.","relatedArticles":{"self":"https://dummies-api.dummies.com/v2/articles?category=33585&offset=0&size=5"}},"_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"relatedCategoriesLoadedStatus":"success"},"listState":{"list":{"count":10,"total":155,"items":[{"headers":{"creationTime":"2016-03-27T16:53:26+00:00","modifiedTime":"2022-03-01T17:52:45+00:00","timestamp":"2022-03-01T18:01:07+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Cisco Networking All-in-One For Dummies Cheat Sheet","strippedTitle":"cisco networking all-in-one for dummies cheat sheet","slug":"cisco-networking-all-in-one-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Get acquainted with Cisco network devices and code listings and learn to develop and manage secure Cisco systems.","noIndex":0,"noFollow":0},"content":"To create and configure a Cisco network, you need to know about routers and switches to develop and manage secure Cisco systems. Become acquainted with Cisco network devices and code listings; and find out how to manage static routing and view routing information.","description":"To create and configure a Cisco network, you need to know about routers and switches to develop and manage secure Cisco systems. Become acquainted with Cisco network devices and code listings; and find out how to manage static routing and view routing information.","blurb":"","authors":[{"authorId":9897,"name":"Edward Tetz","slug":"edward-tetz","description":"Edward Tetz, A+, MCSE, MCT, has written several guides to MCSE and other certifications.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/9897"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-621e5f633b85c\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-621e5f633bdc7\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":186978,"title":"OSI Model for Cisco Networking","slug":"osi-model-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186978"}},{"articleId":186968,"title":"How to Configure a Cisco Network","slug":"how-to-configure-a-cisco-network","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186968"}},{"articleId":186977,"title":"Creating a VLAN for Cisco Networking","slug":"creating-a-vlan-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186977"}},{"articleId":186992,"title":"Using EtherChannel for Cisco Networking","slug":"using-etherchannel-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186992"}},{"articleId":186976,"title":"Working with Spanning Tree Protocol for Cisco Networking","slug":"working-with-spanning-tree-protocol-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186976"}},{"articleId":186983,"title":"Managing Static Routing for Cisco Networking","slug":"managing-static-routing-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186983"}},{"articleId":186975,"title":"Viewing Routing Information for Cisco Networking","slug":"viewing-routing-information-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186975"}},{"articleId":186991,"title":"Securing a Cisco Network","slug":"securing-a-cisco-network","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186991"}}],"content":[{"title":"OSI model for Cisco networking","thumb":null,"image":null,"content":"<p>While you may not use the OSI model every day, you should be familiar with it, specifically when working with Cisco switches and routers (which operate at Layer 2 and Layer 3, respectively). Here are some of the items that operate at each level of the OSI model:</p>\n<table>\n<tbody>\n<tr>\n<th>Layer</th>\n<th>Description</th>\n<th>Examples</th>\n</tr>\n<tr>\n<td>7. Application</td>\n<td>Responsible for initiating or services the request.</td>\n<td>SMTP, DNS, HTTP, and Telnet</td>\n</tr>\n<tr>\n<td>6. Presentation</td>\n<td>Formats the information so that it is understood by the<br />\nreceiving system.</td>\n<td>Compression and encryption depending on the implementation</td>\n</tr>\n<tr>\n<td>5. Session</td>\n<td>Responsible for establishing, managing, and terminating the<br />\nsession.</td>\n<td>NetBIOS</td>\n</tr>\n<tr>\n<td>4. Transport</td>\n<td>Breaks information into segments and is responsible for<br />\nconnection and connectionless communication.</td>\n<td>TCP and UDP</td>\n</tr>\n<tr>\n<td>3. Network</td>\n<td>Responsible for logical addressing and routing</td>\n<td>IP, ICMP, ARP, RIP, IGRP, and routers</td>\n</tr>\n<tr>\n<td>2. Data Link</td>\n<td>Responsible for physical addressing, error correction, and<br />\npreparing the information for the media</td>\n<td>MAC address, CSMA/CD, switches, and bridges</td>\n</tr>\n<tr>\n<td>1. Physical</td>\n<td>Deals with the electrical signal.</td>\n<td>Cables, connectors, hubs, and repeaters</td>\n</tr>\n</tbody>\n</table>\n"},{"title":"How to configure a Cisco network","thumb":null,"image":null,"content":"<p>Like all networks, a Cisco network needs to be properly configured. To do so, you need to know the configuration modes to use when configuring your network. You also should know how to configure an interface, configure a switch management interface, and configure an interface to use DHCP for your Cisco network.</p>\n<h2>Configuration modes for Cisco networking</h2>\n<p>When moving around in the Cisco IOS, you will see many prompts. These prompts change as you move from one configuration mode to another. Here is a summary of the major configuration modes:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>User EXEC mode:</b> When you connect to a Cisco device the default configuration mode is user exec mode. With user exec mode you can view the settings on the device but not make any changes. You know you are in User EXEC mode because the IOS prompt displays a &#8220;&gt;&#8221;.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Privileged EXEC mode:</b> In order to make changes to the device you must navigate to Privileged EXEC mode where you may be required to input a password. Privileged EXEC mode displays with a &#8220;#&#8221; in the prompt.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Global Configuration mode:</b> Global Configuration mode is where you go to make global changes to the router such as the hostname. To navigate to Global Configuration mode from Privileged EXEC mode you type &#8220;configure terminal&#8221; or &#8220;conf t&#8221; where you will be placed at the &#8220;(config)#&#8221; prompt.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Sub Prompts:</b> There are a number of different sub prompts from Global Configuration mode you can navigate to such as the interface prompts to modify settings on a specific interface, or the line prompts to modify the different ports on the device.</p>\n</li>\n</ul>\n<h2>Configure an interface for Cisco networking</h2>\n<p>When working with routers in particular, but also when dealing the management interface on switches, you will often need to configure network interfaces which will either match physical interface ports or virtual interfaces in the form of a virtual LAN (VLAN) interface (when dealing with switches).</p>\n<p>For your router interfaces the following example will set speed, duplex and IP configuration information for the interface FastEthernet 0/0 (notice the interface reference as slot/port). In the case of the router, the interface is enabled using the no shutdown command in the final step; interfaces on switches are enabled by default.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>interface FastEthernet0/0</b>\r\nRouter1(config-if)#<b>description Private LAN</b>\r\nRouter1(config-if)#<b>speed 100</b>\r\nRouter1(config-if)#<b>duplex full</b>\r\nRouter1(config-if)#<b>ip address 192.168.1.1 255.255.255.0</b>\r\nRouter1(config-if)#<b>no shutdown</b></pre>\n<h2>Configure a switch management interface for Cisco networking</h2>\n<p>For your switches, to enable an IP address on your management interface, you will use something similar to this example. In this example, management is being performed over VLAN 1 &#8211; the default VLAN.</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1#<b>interface VLAN 1</b>\r\nSwitch1(config-if)#<b>ip address 192.168.1.241 255.255.255.0</b></pre>\n<h2>Configure an interface to use DHCP for Cisco networking</h2>\n<p>If you want to configure either a router or switch to retrieve its IP configuration information from a network Dynamic Host Configuration Protocol (DHCP) server, then you can commands like the following example.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>interface FastEthernet0/0</b>\r\nRouter1(config-if)#<b>ip dhcp</b></pre>\n"},{"title":"Creating a VLAN for Cisco networking","thumb":null,"image":null,"content":"<p>When working with your Cisco network, you may want to separate users into different broadcast domains for security or traffic reduction. You can do this by implementing VLANs. The following example will create VLAN (VLAN2) and place the ports on a switch (from 1-12) into VLAN2.</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1(config)#<b>interface vlan 2</b>\r\nSwitch1(config-if)#<b>description Finance VLAN</b>\r\nSwitch1(config-if)#<b>exit</b>\r\nSwitch1(config)#<b>interface range FastEthernet 0/1 , FastEthernet 0/12</b>\r\nSwitch1(config-if-range)#<b>switchport mode access</b>\r\nSwitch1(config-if-range)#<b>switchport access vlan 2</b><b>\r\n</b></pre>\n<p>If you are connecting two switches together, then you will want to allow all configured VLANs to pass between the two switches. This is accomplished by implementing a trunk port. To configure port 24 on your switch to be a trunk port, you will use the following code:</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1(config)#<b>interface FastEthernet 0/24</b>\r\nSwitch1(config-if-range)#<b>switchport mode trunk</b></pre>\n"},{"title":"Using EtherChannel for Cisco networking","thumb":null,"image":null,"content":"<p>Don&#8217;t be afraid to use EtherChannel on your Cisco network. EtherChannel allows you to take up to eight network ports on your switch and treat them as a single larger link. This can be used to connect servers with multiple network cards that are bonded (or teamed) to a switch, or to connect multiple switches together. There are two main negotiation protocols, Port Aggregation Protocol (PAgP) which is a proprietary Cisco protocol and Link Aggregation Control Protocol (LACP) which is an open standards protocol.</p>\n<p>To set EtherChannel to use with of the protocols you will configure it to support one of the following modes.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><span class=\"code\">auto</span>: Sets the interface to respond to PAgP negotiation packets, but the interface will start negotiations on its own.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">desireable</span>: Sets the interface to actively attempt to negotiate a PAgP connection.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">on</span>: Forces the connection to bring all links up without using a protocol to negotiate connections. This mode can only connect to another device that is also set to <b>on</b>. When using this mode, the switch does not negotiate the link using either PAgP or LACP.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">active</span>: Sets the interface to actively attempt to negotiate connections with other LACP devices.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">passive</span>: Sets the interface to respond to LACP data if it receives negotiation requests from other systems.</p>\n</li>\n</ul>\n<p>The following example will configure EtherChannel to use group ports 11 and 12 on the switch together using PAgP as the protocol. The same type of command would be used on the switch to which Switch1 is connected.</p>\n<pre class=\"code\">Switch1&gt; <b>enable</b>\r\nSwitch1# <b>configure terminal</b> \r\nSwitch1(config)# <b>interface range FastE</b><b>thernet0/1</b><b>1</b><b> -</b><b>1</b><b>2</b> \r\nSwitch1(config-if-range)# <b>switchport mode access</b>\r\nSwitch1(config-if-range)# <b>switchport access vlan 10</b>\r\nSwitch1(config-if-range)# <b>channel-group 5 mode desirable</b></pre>\n"},{"title":"Working with spanning tree protocol for Cisco networking","thumb":null,"image":null,"content":"<p>Spanning Tree Protocol (STP) enables you to create redundant loops on your Cisco network for fault tolerance, and prevents inadvertent loops that may be created on your network from bringing the network to its knees.</p>\n<p>The following code will enable the Cisco proprietary Rapid Per VLAN Spanning Tree Protocol (PVST) over the open standard of Multiple Spanning Tree Protocol (MSTP). In addition to configuring STP on the switch, you will also configure port 2 on the switch for portfast, which allows the port to immediately transition to forwarding mode.</p>\n<pre class=\"code\">Switch1&gt; <b>enable</b>\r\nSwitch1# <b>configure terminal</b> \r\nSwitch1(config)#<b>spanning-tree mode rapid-pvst</b>\r\nSwitch1(config)#<b>interface FastEthernet 0/2</b>\r\nSwitch1(config-if)#<b>spanning-tree portfast</b>\r\n%Warning: portfast should only be enabled on ports connected to a single\r\n host. Connecting hubs, concentrators, switches, bridges, etc... to this\r\n interface when portfast is enabled, can cause temporary bridging loops.\r\n Use with CAUTION\r\n%Portfast will be configured in 10 interfaces due to the range command\r\n but will only have effect when the interfaces are in a non-trunking mode.</pre>\n"},{"title":"Managing static routing for Cisco networking","thumb":null,"image":null,"content":"<p>When working with your routers on your Cisco network, it&#8217;s very likely that you&#8217;ll want to have your routers route data. The first step in having your router pass data from one interface to another interface is to enable routing; just use these commands.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>ip routing</b></pre>\n<p>Whether or not you choose to use a dynamic routing protocol, you may add static routes to your router. The following will add a static route to Router1 to send data to the 192.168.5.0/24 network using the router with the IP address of 192.168.3.2.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>ip routing</b>\r\nRouter1(config)#<b>ip route 192.168.5.0 255.255.255.0 192.168.3.2</b></pre>\n<h2>Managing routing information protocol for Cisco networking</h2>\n<p>Routing Information Protocol (RIP) is widely used, with version 2 allowing you to use Variable Length Subnet Masks (VLSM) across your network. The following code will enable routing, enable RIP, set RIP to version 2, disable route summarization, defines the distributed network from this router as 192.168.5.0/24, and rather than broadcasting routes, it will send RIP data directly to 192.168.1.1.</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nRouter2#<b>configure terminal</b>\r\nRouter2(config)#<b>ip routing</b>\r\nRouter2(config)#<b>router rip</b>\r\nRouter2(config-router)#<b>version 2</b>\r\nRouter2(config-router)#<b>no auto-summary</b>\r\nRouter1(config-router)#<b>network 192.168.5</b><b>.0</b>\r\nRouter2(config-router)#<b>neighbor 192.168.1.1</b></pre>\n<h2>Managing enhanced interior gateway routing protocol for Cisco networking</h2>\n<p>Enhanced Interior Gateway Routing Protocol (EIGRP) is the updated version of IGRP. The following code will enable EIGRP using an autonomous-system (AS) number of 100, distribute two networks and disables auto summary.</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nRouter2#<b>configure terminal</b>\r\nRouter2(config)#<b>ip routing</b>\r\nRouter2(config)#<b>router eigrp 100</b>\r\nRouter2(config-router)#<b>network 192.168.1.0</b>\r\nRouter2(config-router)#<b>network 192.168.5.0</b>\r\nRouter2(config-router)#<b>no auto-summary</b></pre>\n<h2>Managing open shortest path first for Cisco networking</h2>\n<p>Open Shortest Path First (OSPF) is a link state protocol which is widely used. OSPF uses the address of the loopback interface as the OSPF identifier, so this example will set the address of the loopback interface, then enable OSPF with a process ID of 100, and distributing a network of 192.168.255.254 and a network of 192.168. 5.0/24</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nRouter2#<b>configure terminal</b>\r\nRouter2(config)#<b>interface loopback 0</b>\r\nRouter2(config-if)#<b>ip address 192.168.255.254 255.255.255.0</b>\r\nRouter2(config-if)#<b>exit</b>\r\nRouter2(config)#<b>router ospf 100</b>\r\nRouter2(config-router)#<b>network 192.168.255.254 0.0.0.0 area 0</b>\r\nRouter2(config-router)#<b>network 192.168.5.0 0.0.0.255 area 0</b></pre>\n"},{"title":"Viewing routing information for Cisco networking","thumb":null,"image":null,"content":"<p>After setting up any routing protocol that you want to implement &#8211; RIP, OSPF, or EIGRP &#8211; you can view all of your routing information through the <span class=\"code\">ip route</span> command. The following is an example of the output of this command. The output includes a legend showing the codes for each routing protocol, and the specific routes are identified by the source protocol.</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nPassword:\r\nRouter2#<b>show ip route</b>\r\nCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP\r\n D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area\r\n N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2\r\n E1 - OSPF external type 1, E2 - OSPF external type 2\r\n i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2\r\n ia - IS-IS inter area, * - candidate default, U - per-user static route\r\n o - ODR, P - periodic downloaded static route\r\nGateway of last resort is not set\r\nD 192.168.10.0/24 [90/284160] via 192.168.1.1, 00:04:19, FastEthernet0/0\r\nO 192.168.10.0/24 [110/11] via 192.168.1.1, 00:01:01, FastEthernet0/0\r\nR 192.168.10.0/24 [120/1] via 192.168.1.1, 00:00:07, FastEthernet0/0\r\nC 192.168.5.0/24 is directly connected, FastEthernet0/1\r\nC 192.168.1.0/24 is directly connected, FastEthernet0/0\r\nS 192.168.3.0/24 [1/0] via 192.168.1.1</pre>\n"},{"title":"Securing a Cisco network","thumb":null,"image":null,"content":"<p>Security is always a concern, and your Cisco network needs to be properly secured. In the following sections, you see how to secure your Cisco network by configuring NAT, by configuring an ACL, and by applying that ACL.</p>\n<h2>Securing your Cisco network by configuring NAT</h2>\n<p>The following commands are used to configure NAT overload services on a router called Router1. In this example, a list of source address is created in access list #1, which is then used as the inside source list. The FastEthernet 0/0 port is the overloaded public address port that all inside addresses get translated to.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>access-list 1 permit 10.0.0.0 0.255.255.255</b>\r\nRouter1(config)#<b>ip nat inside source list 1 interface FastEthernet 0/0 overload</b>\r\nRouter1(config)#<b>interface FastEthernet0/0</b>\r\nRouter1(config-if)#<b>ip nat outside</b>\r\nRouter1(config-if)#<b>interface FastEthernet0/1</b>\r\nRouter1(config-if)#<b>ip nat inside</b></pre>\n<h2>Securing your Cisco network by configuring an access control list (ACL)</h2>\n<p>ACLs are used to control traffic flow. They can be used allow or deny the flow of traffic. The two main types of ACLs are:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">Standard ACLs, which have fewer <b>options</b> for classifying data and controlling traffic flow than Extended ACLs. They are only able to manage traffic based on the source IP address. These ACLs are numbered from 1–99 and from 1300–1999.</p>\n</li>\n<li>\n<p class=\"first-para\">Extended ACLs, which offer the ability to filter or control traffic based on a variety of criteria such as source or destination IP addresses, as well as protocol type such as, ICMP, TCP, UDP, or IP. These ACLs are numbered from 100–199 and from 2000–2699.</p>\n</li>\n</ul>\n<p>To create a standard ACL, you can use the following example which will create an ACL that allows traffic for the 192.168.8.0/24 network.</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1(config)<b>#access-list 50 permit 192.168.8.0 0.0.0.255</b></pre>\n<p>To create an extended ACL you can use the following example which will create an ACL that allows traffic with addresses in the 192.168.8.0/24 network and tcp ports of either 80 (http) or 443 (https):</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>access-list 101 remark This ACL is to control the outbound router traffic.</b>\r\nRouter1(config)#<b>access-list 101 permit tcp 192.168.8.0 0.0.0.255 any eq 80</b>\r\nRouter1(config)<b>#access-list 101 permit tcp 192.168.8.0 0.0.0.255 any eq 443</b></pre>\n<h2>Securing your Cisco network by applying an access control list</h2>\n<p>After you have created an Access Control List (ACL), such as ACL 101 created above, you can apply that ACL to an interface. In the following example, this ACL is placed to restrict outbound traffic on FastEthernet0/1.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>interface F</b><b>astEthernet0/1</b>\r\nRouter1(config-if)#<b>ip access-group 101 out</b></pre>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-03-01T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":208539},{"headers":{"creationTime":"2016-03-27T16:58:40+00:00","modifiedTime":"2022-02-28T19:35:56+00:00","timestamp":"2022-03-01T00:01:06+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"TCP/IP For Dummies Cheat Sheet","strippedTitle":"tcp/ip for dummies cheat sheet","slug":"tcpip-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"To be a master of TCP/IP, become familiar with security terms, general definitions, and Requests For Comment (RFCs).","noIndex":0,"noFollow":0},"content":"As a network administrator, you know that TCP/IP is the glue that holds the Internet and the Web together. As well as being familiar with security terms and general definitions, you need to pay attention to RFCs (Requests for Comment) published by the Internet Engineering Task Force. You can comment on, learn from, and submit RFCs yourself.","description":"As a network administrator, you know that TCP/IP is the glue that holds the Internet and the Web together. As well as being familiar with security terms and general definitions, you need to pay attention to RFCs (Requests for Comment) published by the Internet Engineering Task Force. You can comment on, learn from, and submit RFCs yourself.","blurb":"","authors":[{"authorId":10596,"name":"Candace Leiden","slug":"candace-leiden","description":"Candace Leiden consults on systems and database performance and instructional design for international courseware.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/10596"}},{"authorId":10597,"name":"Marshall Wilensky","slug":"marshall-wilensky","description":"Marshall Wilensky is a retired consultant and network manager for multiprotocol networks.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/10597"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":196388,"title":"TCP/IP Definitions","slug":"tcpip-definitions","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196388"}},{"articleId":196385,"title":"Notable Requests for Comments of Interest to TCP/IP Users","slug":"notable-requests-for-comments-of-interest-to-tcpip-users","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196385"}},{"articleId":196387,"title":"Internet Security Terms and Tips to Use with TCP/IP","slug":"internet-security-terms-and-tips-to-use-with-tcpip","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196387"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281878,"slug":"tcp-ip-for-dummies-6th-edition","isbn":"9780470450604","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/0470450606-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/tcp-ip-for-dummies-6th-edition-cover-9780470450604-202x255.jpg","width":202,"height":255},"title":"TCP / IP For Dummies, 6th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <b data-author-id=\"10596\">Candace Leiden</b> consults on systems and database performance and instructional design for international courseware. <p><b data-author-id=\"10597\">Marshall Wilensky</b> was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.</p> ","authors":[{"authorId":10596,"name":"Candace Leiden","slug":"candace-leiden","description":"Candace Leiden consults on systems and database performance and instructional design for international courseware.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/10596"}},{"authorId":10597,"name":"Marshall Wilensky","slug":"marshall-wilensky","description":"Marshall Wilensky is a retired consultant and network manager for multiprotocol networks.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/10597"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470450604&quot;]}]\" id=\"du-slot-621d6242d6c64\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470450604&quot;]}]\" id=\"du-slot-621d6242d71e7\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":196388,"title":"TCP/IP Definitions","slug":"tcpip-definitions","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196388"}},{"articleId":196387,"title":"Internet Security Terms and Tips to Use with TCP/IP","slug":"internet-security-terms-and-tips-to-use-with-tcpip","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196387"}},{"articleId":196385,"title":"Notable Requests for Comments of Interest to TCP/IP Users","slug":"notable-requests-for-comments-of-interest-to-tcpip-users","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196385"}}],"content":[{"title":"TCP/IP definitions","thumb":null,"image":null,"content":"<p>Knowing your way around TCP/IP is key if you want to manage a network successfully. The definitions in the following list explain the basics, such as what an IP address is, and they also clarify the various nets you deal with — extranets, intranet, and subnetting — as well other key terms.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>CIDR (Classless InterDomain Routing):</b> A way to conserve on IP addresses. An IP addressing design that replaces the traditional Class A, B, C structure, CIDR allows one IP address to represent many IP addresses. A CIDR address looks like a regular IP address with a “suffix” on the end, such as 192.200.0.0/12. The suffix is an <i>IP prefix</i>.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>extranet:</b> A private/public hybrid network that uses TCP/IP to share part of an intranet with an outside organization. An extranet is the part of an intranet that outsiders can access over the Internet. Be sure to have good security practices if you have an extranet.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>intranet:</b> An organization’s private network. If your intranet is built on TCP/IP protocols, applications, and services, it’s also an Internet.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>IP address:</b> The 32-bit (IPv4) or 128-bit (IPv6) numeric address for a computer. You must have an IP address to be connected to the Internet. An IP address consists of two parts: the network piece and the host piece. An IPv4 example: 127.0.0.1; an IPv6 example: 0:0:0:0:0:0:0:1 (::1 for short).</p>\n</li>\n<li>\n<p class=\"first-para\"><b>loopback address:</b> IP shorthand for you — actually, your computer. The loopback is a special IP address (127.0.0.1) that isn’t physically connected to any network hardware. You use it to test TCP/IP services and applications without worrying about hardware problems.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Network Address Translation (NAT):</b> Helps the Internet not run out of IP addresses by translating an IP address (perhaps not unique) on one network to another IP address on a different network — usually, the Internet. IPv6 does away with the need for NAT address help, but NAT, unintentionally, also provides firewall security.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>subnetting:</b> Dividing one large Internet into smaller networks (subnets) in which they all share the same network portion of an IP address.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>TCP/IP (Transmission Control Protocol/Internet Protocol):</b> The guts and the rules of the Internet and World Wide Web. A set of protocols, services, and applications for linking computers of all kinds.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Virtual private network (VPN):</b> A private network that runs over the public Internet. You can build a VPN at low cost by using the Internet (rather than your own system of private — and expensive — lines) with special security checks and a tunneling protocol. Companies are beginning to use a private virtual network for both extranets and wide-area intranets.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Voice over Internet Protocol (VoIP):</b> Are you spending too much on phone calls? Get rid of your phone service. You can make phone calls from anywhere to anywhere that has a computer, free VoIP software, and a fast Internet connection. Even better, it’s free. You can call from Buenos Aires to Nairobi for free with VoIP. It doesn’t have to be computer to computer, either. You can also use VoIP to call a regular telephone number.</p>\n</li>\n</ul>\n<p class=\"Tip\">Are you acronym challenged? If you don’t know what a particular acronym means, visit <a href=\"http://whatis.techtarget.com/\" target=\"_blank\" rel=\"noopener\">WhatIs?</a> where you can find thousands of definitions for Internet and security acronyms.</p>\n"},{"title":"Internet security terms and tips to use with TCP/IP","thumb":null,"image":null,"content":"<p>You’re a network administrator, so you know that keeping your Web site secure is an ongoing challenge. You don’t have to know that TCP/IP stands for Transmission Control Protocol/Internet Protocol to use it effectively, but knowing the terms in the following list can make you better able to deal with security issues.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>Advanced Encryption Standard</b>: A secret key cipher used for encryption.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>authentication:</b> Proving you are who you say you are. The simplest form of authentication, an unencrypted username-and-password challenge (“Who are you?” “James Bond.” “Okay, I believe you”), often isn’t reliable enough for the Internet. On the Internet, where hackers and crackers can fake or steal more than your username and password, trust no one. Require authentication for users, computers, and IP addresses to be secure.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>cipher</b>: A means used to encrypt data. A cipher transforms plain text into scrambled cipher text. You can’t decipher the coded cipher text back into plain text without using some kind of key. For example, AES and DES are examples of secret key block ciphers. The complete encryption algorithm is the cipher plus the technique.</p>\n</li>\n<li>\n<p class=\"first-para\"><a href=\"http://www.csrc.nist.gov\" target=\"_blank\" rel=\"noopener\"><b>Computer Security Resource Center</b></a><b>:</b> A Web site that contains security publications, alerts, and news, including documents from the U.S. Department of Defense on security architecture and trusted systems. Located at the U.S. National Institute of Standards and Technology Computer Security Resource Clearinghouse.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>digital certificate:</b> A special, secure file that guarantees your online identity. A digital certificate contains security information, including your name and e-mail address, your encryption key, the name of the Certificate Authority, and the length of the certificate’s validity. (“Who are you?” “James Bond.” “Can you prove your ID?”). A digital certificate is a popular way to perform authentication on the Internet.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>encryption: </b>Scrambling your data by applying a secret code so that no one can read it without using a key.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>IP Security (IPSec):</b> A set of TCP/IP protocols that provide authentication and encryption services, but on a lower layer than TLS.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>public key/private key:</b> A key exchange encryption scheme that uses two keys to encrypt and decrypt data. Anyone can use a public key to encrypt data before it goes across the Internet. Only the receiver has the private key needed to read the data. Pretty Good Privacy (PGP) uses public key/private key encryption methods.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Transport Layer Security (TLS), Secure Socket Layer (SSL):</b> TCP/IP protocols that guarantee privacy on a network by providing authentication and encryption. TLS and its nonstandard companion SSL ensure that your credit card information is safe when you bank or shop. TLS is newer and standard. SSL is still used more.</p>\n</li>\n</ul>\n"},{"title":"Notable requests for comments of interest to TCP/IP users","thumb":null,"image":null,"content":"<p>As a network administrator, you’re familiar with certain things — TCP/IP, security threats, and Requests for Comments, or RFCs. Published by the Internet Engineering Task Force, RFCs offer a chance for professionals to share information, present papers for review, and generally communicate amongst themselves. Some RFCs eventually get adopted as Internet standards.</p>\n<p>The following list contains RFCs that are especially interesting and/or useful:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">RFC 3271, “The Internet is for Everyone,” by V. Cerf</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2664, “FYI on Questions and Answers — Answers to Commonly Asked New Internet User Questions,” by R. Plzak, A. Wells, E. Krol</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2151, “A Primer on Internet and TCP/IP Tools and Utilities,” by G. Kessler, S. Shepard</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2504, “Users&#8217; Security Handbook,” by E. Guttman, L. Leong, G. Malkin</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 1244, “Site Security Handbook” (still useful after many years), by J.P. Holbrook, J.K. Reynolds</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 5485, “Digital Signatures on Internet-Draft Documents”</p>\n</li>\n</ul>\n<p>For laughs, scan these April Fool’s Day RFCs:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">RFC 3251, “Electricity over IP,” by B. Rajagopalan</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 1925, “The Twelve Networking Truths,” R. Callon, Editor</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2100, “The Naming of Hosts” (love the poetry!), by J. Ashworth</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2549, “IP over Avian Carriers with Quality of Service,” by D. Waitzman</p>\n</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-02-28T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":209488},{"headers":{"creationTime":"2022-02-03T21:22:52+00:00","modifiedTime":"2022-02-03T21:26:27+00:00","timestamp":"2022-02-24T17:07:29+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","strippedTitle":"windows server 2022 and powershell all-in-one for dummies cheat sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"This Cheat Sheet summarizes the key information related to the installation and operations of a Windows Server 2022 network.","noIndex":0,"noFollow":0},"content":"PowerShell 5.1 is the version of Windows PowerShell that ships with Windows Server 2022, Windows Server 2019, and Windows Server 2016. It’s available for installation on Windows Server 2008 R2 with Service Pack1, Windows Server 2012, and Windows Server 2012 R2. The last three operating systems must have Windows Management Framework 5.1 installed to support PowerShell 5.1.\r\n\r\nYou can upgrade to PowerShell 7.2 fairly easily (the more recent version from Microsoft), though the examples on this Cheat Sheet were only tested in PowerShell 5.1.","description":"PowerShell 5.1 is the version of Windows PowerShell that ships with Windows Server 2022, Windows Server 2019, and Windows Server 2016. It’s available for installation on Windows Server 2008 R2 with Service Pack1, Windows Server 2012, and Windows Server 2012 R2. The last three operating systems must have Windows Management Framework 5.1 installed to support PowerShell 5.1.\r\n\r\nYou can upgrade to PowerShell 7.2 fairly easily (the more recent version from Microsoft), though the examples on this Cheat Sheet were only tested in PowerShell 5.1.","blurb":"","authors":[{"authorId":24327,"name":"Sara Perrott","slug":"sara-perrott","description":"Sara Perrott is an information security professional with a systems and network engineering background. She teaches classes related to Windows Server, Amazon Web Services, networking, and virtualization. Perrott addressed the AWS Imagine conference in 2018 and presented at the RSA conference in 2019. ","_links":{"self":"https://dummies-api.dummies.com/v2/authors/24327"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":290627,"slug":"windows-server-2022-and-powershell-all-in-one-for-dummies","isbn":"9781119867821","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119867827-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/9781119867821-203x255.jpg","width":203,"height":255},"title":"Windows Server 2022 and PowerShell All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"\n <p><b data-author-id=\"24327\">Sara Perrott</b> is an information security professional with a systems and network engineering background. She teaches classes related to Windows Server, Amazon Web Services, networking, and virtualization. Perrott addressed the AWS Imagine conference in 2018 and presented at the RSA conference in 2019.</p>","authors":[{"authorId":24327,"name":"Sara Perrott","slug":"sara-perrott","description":"Sara Perrott is an information security professional with a systems and network engineering background. She teaches classes related to Windows Server, Amazon Web Services, networking, and virtualization. Perrott addressed the AWS Imagine conference in 2018 and presented at the RSA conference in 2019. ","_links":{"self":"https://dummies-api.dummies.com/v2/authors/24327"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119867821&quot;]}]\" id=\"du-slot-6217bb51e7400\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119867821&quot;]}]\" id=\"du-slot-6217bb51e7da4\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/"}}],"content":[{"title":"Common administrative tasks","thumb":null,"image":null,"content":"<p>Most system administrators have some commands that they find useful on a daily basis. Here are some you’re sure to need.</p>\n<h3>Setting up for remote management</h3>\n<p>For setting up remote management on systems, there are two commands you need to be aware of.</p>\n<p>To start the WinRM service and create exceptions in the Windows Firewall, run the following:</p>\n<p>winrm quickconfig</p>\n<p>To configure the system to accept remote PowerShell commands via WS-MAN, run the following:</p>\n<p>Enable-PSRemoting</p>\n<h3>Disabling sconfig at startup on Windows Server Core</h3>\n<p>If you’ve worked with Windows Server Core, you’re probably familiar with sconfig, the configuration utility. It’s the first screen you see after you log in to a Windows Server Core system. You may want to disable this menu from coming up after login, and you can do so by typing the following and pressing the Enter key:</p>\n<p>Set-SConfig -AutoLaunch $false</p>\n<p>That’s all there is to it! If you change your mind and you decide you want it to launch again after login, simply type the following and press Enter:</p>\n<p>Set-SConfig -AutoLaunch $true</p>\n<h3>Using environmental variables</h3>\n<p>To view available environmental variables, run the following:</p>\n<p>Set | More</p>\n<p>To add a folder named Tools to a path variable so you can run those tools without having to be in that directory, run the following:</p>\n<p>SET PATH=%PATH%;C:\\Tools</p>\n<p>To view your current path variable settings, type the following:</p>\n<p>echo %PATH%</p>\n<h3>Enabling/disabling the firewall</h3>\n<p>Here’s the command to disable the firewall for all profiles:</p>\n<p>Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False</p>\n<p>To re-enable the firewall for all profiles, use the following:</p>\n<p>Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled True</p>\n"},{"title":"Working with containers","thumb":null,"image":null,"content":"<p>Containers are the new technology trend, especially as the world shift toward microservices. Here are some helpful Docker commands:</p>\n<ul>\n<li><strong>docker login:</strong> Logs you into a DockerHub repository.</li>\n<li><strong>docker pull mcr.microsoft.com/windows/nanoserver:ltsc2022: </strong>Retrieves container images. In this case, it pulls from the mcr.microsoft.com/windows repository and retrieves the nanoserver image with the tag ltsc2022.</li>\n</ul>\n<p class=\"article-tips tip\">The nanoserver container images no longer use the latest tag so you’ll have to specify which container image tag you want. You can look up available tags on the container image’s page on Docker Hub.</p>\n<ul>\n<li><strong>docker ps:</strong> Shows all running containers. To view all containers, including those not running, simply add -a to the end of the command.</li>\n<li><strong>docker build &lt;dockerfile&gt;:</strong> Builds a container from a Dockerfile.</li>\n<li><strong>docker run:</strong> Starts a container utilizing various arguments.</li>\n<li><strong>docker volume create:</strong> Creates a named volume.</li>\n<li><strong>docker container prune:</strong> Removes stopped containers.</li>\n</ul>\n"},{"title":"Troubleshooting with the command prompt","thumb":null,"image":null,"content":"<p>&nbsp;</p>\n<table>\n<thead>\n<tr>\n<td><strong>Name</strong></td>\n<td width=\"91\"><strong>Command</strong></td>\n<td width=\"444\"><strong>Description</strong></td>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>System File Checker</td>\n<td width=\"91\">sfc /scannow</td>\n<td width=\"444\">This utility checks system files to see if they match what’s expected by comparing the signature of the system file on the server with the signature of a cached copy of the same file. The cached files are stored in a compressed folder located at C:\\Windows\\System32\\dllcache. If a corrupt system file is found, it’s replaced.</td>\n</tr>\n<tr>\n<td>Check Disk</td>\n<td width=\"91\">chkdsk /f /r</td>\n<td width=\"444\">This utility repairs file system errors and marks bad sectors so the operating system doesn’t use them anymore. The /f tells the utility to fix any issues it finds, and the /r locates the bad <em>sectors</em> (areas) on the disk. This can take a while. Kick it off, and grab a cup of coffee.</td>\n</tr>\n<tr>\n<td>Driverquery</td>\n<td width=\"91\">driverquery</td>\n<td width=\"444\">This utility queries the system for all the hardware drivers that are installed on Windows. This can be very helpful if you’re running into issues with systems that have similar hardware and you want to know if they have a driver in common.</td>\n</tr>\n<tr>\n<td>BCDEdit</td>\n<td width=\"91\">bcdedit</td>\n<td width=\"444\">Allows you to edit the boot configuration on your Windows server.</td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-02-03T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":290654},{"headers":{"creationTime":"2016-03-26T14:44:49+00:00","modifiedTime":"2021-12-27T21:14:42+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Network Administration: Granting Share Permissions","strippedTitle":"network administration: granting share permissions","slug":"network-administration-granting-share-permissions","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"When you first create a file share on your network, all users are granted read-only access to the share. If you want to allow users to modify files in the share or allow them to create new files, you need to add permissions. Here’s how to do this using Windows Explorer:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Open Windows Explorer by pressing the Windows key and clicking Computer; then browse to the folder whose permissions you want to manage.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Right-click the folder you want to manage and then choose Properties from the contextual menu.</p>\r\n<p class=\"child-para\">The Properties dialog box for the folder appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Sharing tab; then click Advanced Sharing.</p>\r\n<p class=\"child-para\">The Advanced Sharing dialog box appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click Permissions.</p>\r\n<p class=\"child-para\">The dialog box shown appears. This dialog box lists all the users and groups to whom you’ve granted permission for the folder. Initially, read permissions are granted to a group called Everyone, which means that anyone can view files in the share but no one can create, modify, or delete files in the share.</p>\r\n<p class=\"child-para\">When you select a user or group from the list, the check boxes at the bottom of the list change to indicate which specific permissions you’ve assigned to each user or group.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380583.image0.jpg\" alt=\"image0.jpg\" width=\"330\" height=\"400\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Add button.</p>\r\n<p class=\"child-para\">The dialog box shown appears.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380584.image1.jpg\" alt=\"image1.jpg\" width=\"535\" height=\"293\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Enter the name of the user or group to whom you want to grant permission and then click OK.</p>\r\n<p class=\"child-para\">If you’re not sure of the name, click the Advanced button. This action brings up a dialog box from which you can search for existing users.</p>\r\n<p class=\"child-para\">When you click OK, you return to the Share Permissions tab, with the new user or group added.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Select the appropriate Allow and Deny check boxes to specify which permissions to allow for the user or group.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Repeat Steps 5–7 for any other permissions that you want to add.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">When you’re done, click OK.</p>\r\n</li>\r\n</ol>\r\nHere are a few other thoughts to ponder concerning adding permissions:\r\n\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">If you want to grant full access to everyone for this folder, don’t bother adding another permission. Instead, select the Everyone group and then select the Allow check box for each permission type.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">You can remove a permission by selecting the permission and then clicking the Remove button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">If you’d rather not fuss with the Share and Storage Management console, you can set the permissions from My Computer. Right-click the shared folder, choose Sharing and Security from the contextual menu, and then click Permissions. Then you can follow the preceding procedure, picking up at Step 5.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is most restrictive always applies. If the share permissions grant a user Full Control permission but the folder permission grants the user only Read permission, for example, the user has only Read permission for the folder.</p>\r\n</li>\r\n</ul>","description":"When you first create a file share on your network, all users are granted read-only access to the share. If you want to allow users to modify files in the share or allow them to create new files, you need to add permissions. Here’s how to do this using Windows Explorer:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Open Windows Explorer by pressing the Windows key and clicking Computer; then browse to the folder whose permissions you want to manage.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Right-click the folder you want to manage and then choose Properties from the contextual menu.</p>\r\n<p class=\"child-para\">The Properties dialog box for the folder appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Sharing tab; then click Advanced Sharing.</p>\r\n<p class=\"child-para\">The Advanced Sharing dialog box appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click Permissions.</p>\r\n<p class=\"child-para\">The dialog box shown appears. This dialog box lists all the users and groups to whom you’ve granted permission for the folder. Initially, read permissions are granted to a group called Everyone, which means that anyone can view files in the share but no one can create, modify, or delete files in the share.</p>\r\n<p class=\"child-para\">When you select a user or group from the list, the check boxes at the bottom of the list change to indicate which specific permissions you’ve assigned to each user or group.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380583.image0.jpg\" alt=\"image0.jpg\" width=\"330\" height=\"400\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Add button.</p>\r\n<p class=\"child-para\">The dialog box shown appears.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380584.image1.jpg\" alt=\"image1.jpg\" width=\"535\" height=\"293\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Enter the name of the user or group to whom you want to grant permission and then click OK.</p>\r\n<p class=\"child-para\">If you’re not sure of the name, click the Advanced button. This action brings up a dialog box from which you can search for existing users.</p>\r\n<p class=\"child-para\">When you click OK, you return to the Share Permissions tab, with the new user or group added.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Select the appropriate Allow and Deny check boxes to specify which permissions to allow for the user or group.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Repeat Steps 5–7 for any other permissions that you want to add.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">When you’re done, click OK.</p>\r\n</li>\r\n</ol>\r\nHere are a few other thoughts to ponder concerning adding permissions:\r\n\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">If you want to grant full access to everyone for this folder, don’t bother adding another permission. Instead, select the Everyone group and then select the Allow check box for each permission type.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">You can remove a permission by selecting the permission and then clicking the Remove button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">If you’d rather not fuss with the Share and Storage Management console, you can set the permissions from My Computer. Right-click the shared folder, choose Sharing and Security from the contextual menu, and then click Permissions. Then you can follow the preceding procedure, picking up at Step 5.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is most restrictive always applies. If the share permissions grant a user Full Control permission but the folder permission grants the user only Read permission, for example, the user has only Read permission for the folder.</p>\r\n</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4864c09\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4865589\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":164953},{"headers":{"creationTime":"2016-08-17T12:34:25+00:00","modifiedTime":"2021-12-27T18:59:16+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Using Workgroup Templates Across Your Network","strippedTitle":"using workgroup templates across your network","slug":"using-workgroup-templates-across-network","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"Although an occasional sacrifice to the Office gods may make your networking life a bit easier, a template isn’t a place of worship. Rather, a <em>template</em> is a special type of document file that holds formatting information, boilerplate text, and other customized settings that you can use as the basis for new documents.\r\n\r\nThree Office programs — Word, Excel, and PowerPoint — enable you to specify a template whenever you create a new document. When you create a new document in Word, Excel, or PowerPoint by choosing File → New, you see a dialog box that lets you choose a template for the new document.\r\n\r\nOffice comes with a set of templates for the most common types of documents. These templates are grouped under the various tabs that appear across the top of the New dialog box.\r\n\r\nIn addition to the templates that come with Office, you can create your own templates in Word, Excel, and PowerPoint. Creating your own templates is especially useful if you want to establish a consistent look for documents prepared by your network users. For example, you can create a Letter template that includes your company’s letterhead or a Proposal template that includes a company logo.\r\n\r\nOffice enables you to store templates in two locations. Where you put them depends on what you want to do with them:\r\n<ul>\r\n \t<li><strong>The User Templates folder on each user’s local disk drive:</strong> If a particular user needs a specialized template, put it here.</li>\r\n \t<li><strong>The Workgroup Templates folder on a shared network drive:</strong> If you have templates that you want to make available to all network users on the network server, put them here. This arrangement still allows each user to create templates that aren’t available to other network users.</li>\r\n</ul>\r\nWhen you use both a User Templates folder and a Workgroup Templates folder, Office combines the templates from both folders and lists them in alphabetical order in the New dialog box. For example, the User Templates folder may contain templates named Blank Document and web Page, and the Workgroup Templates folder may contain a template named Company Letterhead. In this case, three templates appear in the New dialog box, in this order: Blank Document, Company Letterhead, and web Page.\r\n\r\nTo set the location of the User Templates and Workgroup Templates folders, follow these steps in Microsoft Word:\r\n<ol>\r\n \t<li>In Word, create a new document or open an existing document. It doesn't matter which document you use. This step is required simply because word doesn't let you access the template folder locations unless a document is open.</li>\r\n \t<li>Choose File, and then Options. The Word Options dialog box opens.</li>\r\n \t<li>Click the Advanced tab. The Advanced options appear.</li>\r\n \t<li>Scroll down to the General section and then click the File Locations button. The File Locations dialog box appears.\r\n\r\n[caption id=\"attachment_222302\" align=\"aligncenter\" width=\"535\"]<a href=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\"><img class=\"wp-image-222302 size-full\" src=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\" alt=\"file locations\" width=\"535\" height=\"403\" /></a> Setting the file locations.[/caption]</li>\r\n \t<li class=\"NumListItem\">Double-click the Workgroup Templates item. This step opens a dialog box that lets you browse to the location of your template files.</li>\r\n \t<li class=\"NumListItem\">Browse to the template files and then click OK. You return to the File Locations dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK to dismiss the File Locations dialog box. You return to the Word Options dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK again. The Word Options dialog box is dismissed.</li>\r\n</ol>\r\n<p class=\"article-tips tip\">Although the User Templates and Workgroup Templates settings affect Word, Excel, and PowerPoint, you can change these settings only from Word. The Options dialog boxes in Excel and PowerPoint don’t show the User Templates or Workgroup Templates options.</p>\r\nWhen you install Office, the standard templates that come with Office are copied into a folder on the computer’s local disk drive, and the User Templates option is set to this folder. The Workgroup Templates option is left blank. You can set the Workgroup Templates folder to a shared network folder by clicking Network Templates, clicking the Modify button, and specifying a shared network folder that contains your workgroup templates.","description":"Although an occasional sacrifice to the Office gods may make your networking life a bit easier, a template isn’t a place of worship. Rather, a <em>template</em> is a special type of document file that holds formatting information, boilerplate text, and other customized settings that you can use as the basis for new documents.\r\n\r\nThree Office programs — Word, Excel, and PowerPoint — enable you to specify a template whenever you create a new document. When you create a new document in Word, Excel, or PowerPoint by choosing File → New, you see a dialog box that lets you choose a template for the new document.\r\n\r\nOffice comes with a set of templates for the most common types of documents. These templates are grouped under the various tabs that appear across the top of the New dialog box.\r\n\r\nIn addition to the templates that come with Office, you can create your own templates in Word, Excel, and PowerPoint. Creating your own templates is especially useful if you want to establish a consistent look for documents prepared by your network users. For example, you can create a Letter template that includes your company’s letterhead or a Proposal template that includes a company logo.\r\n\r\nOffice enables you to store templates in two locations. Where you put them depends on what you want to do with them:\r\n<ul>\r\n \t<li><strong>The User Templates folder on each user’s local disk drive:</strong> If a particular user needs a specialized template, put it here.</li>\r\n \t<li><strong>The Workgroup Templates folder on a shared network drive:</strong> If you have templates that you want to make available to all network users on the network server, put them here. This arrangement still allows each user to create templates that aren’t available to other network users.</li>\r\n</ul>\r\nWhen you use both a User Templates folder and a Workgroup Templates folder, Office combines the templates from both folders and lists them in alphabetical order in the New dialog box. For example, the User Templates folder may contain templates named Blank Document and web Page, and the Workgroup Templates folder may contain a template named Company Letterhead. In this case, three templates appear in the New dialog box, in this order: Blank Document, Company Letterhead, and web Page.\r\n\r\nTo set the location of the User Templates and Workgroup Templates folders, follow these steps in Microsoft Word:\r\n<ol>\r\n \t<li>In Word, create a new document or open an existing document. It doesn't matter which document you use. This step is required simply because word doesn't let you access the template folder locations unless a document is open.</li>\r\n \t<li>Choose File, and then Options. The Word Options dialog box opens.</li>\r\n \t<li>Click the Advanced tab. The Advanced options appear.</li>\r\n \t<li>Scroll down to the General section and then click the File Locations button. The File Locations dialog box appears.\r\n\r\n[caption id=\"attachment_222302\" align=\"aligncenter\" width=\"535\"]<a href=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\"><img class=\"wp-image-222302 size-full\" src=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\" alt=\"file locations\" width=\"535\" height=\"403\" /></a> Setting the file locations.[/caption]</li>\r\n \t<li class=\"NumListItem\">Double-click the Workgroup Templates item. This step opens a dialog box that lets you browse to the location of your template files.</li>\r\n \t<li class=\"NumListItem\">Browse to the template files and then click OK. You return to the File Locations dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK to dismiss the File Locations dialog box. You return to the Word Options dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK again. The Word Options dialog box is dismissed.</li>\r\n</ol>\r\n<p class=\"article-tips tip\">Although the User Templates and Workgroup Templates settings affect Word, Excel, and PowerPoint, you can change these settings only from Word. The Options dialog boxes in Excel and PowerPoint don’t show the User Templates or Workgroup Templates options.</p>\r\nWhen you install Office, the standard templates that come with Office are copied into a folder on the computer’s local disk drive, and the User Templates option is set to this folder. The Workgroup Templates option is left blank. You can set the Workgroup Templates folder to a shared network folder by clicking Network Templates, clicking the Modify button, and specifying a shared network folder that contains your workgroup templates.","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}},{"articleId":184875,"title":"The Many Types of Firewalls on a Network","slug":"the-many-types-of-firewalls-on-a-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/184875"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb48437e5\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4844166\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-11-17T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":222301},{"headers":{"creationTime":"2016-08-18T14:35:48+00:00","modifiedTime":"2021-12-27T18:58:27+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Network Administration: How to Create a New User in Active Directory","strippedTitle":"network administration: how to create a new user in active directory","slug":"network-administration-create-new-user-windows-server-2016","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"User accounts are among the basic tools for managing a Windows server. As a network administrator, you’ll spend a large percentage of your time dealing with user accounts To create a new domain user account in Active Directory, follow these steps:","description":"User accounts are among the basic tools for managing a Windows server. As a network administrator, you’ll spend a large percentage of your time dealing with user accounts To create a new domain user account in Active Directory, follow these steps:","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}},{"articleId":184875,"title":"The Many Types of Firewalls on a Network","slug":"the-many-types-of-firewalls-on-a-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/184875"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb483797a\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4838353\"></div></div>"},"articleType":{"articleType":"Step by Step","articleList":null,"content":[{"title":"Choose Start→ Windows Administrative Tools → Active Directory Users and Computers.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Active-Directory-Users-.jpg","width":220,"height":153},"image":{"src":"https://www.dummies.com/wp-content/uploads/Active-Directory-Users.jpg","width":629,"height":440},"content":"<p>This command fires up the Active Directory Users and Computers management console.</p>\n"},{"title":"Right-click the Users Organizational Unit for the domain that you want to add the user to and then choose New →User from the contextual menu.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/new-user.jpg","width":220,"height":187},"image":{"src":"https://www.dummies.com/wp-content/uploads/new-user.jpg","width":535,"height":456},"content":"<p>This command summons the New Object – User Wizard.</p>\n"},{"title":"Enter the user’s first name, middle initial, and last name.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>As you fill in these fields, the New Object Wizard automatically fills in the Full Name field.</p>\n"},{"title":"Change the Full Name field if you want it to appear different from what the wizard proposes.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>You may want to reverse the first and last names so the last name appears first, for example.</p>\n"},{"title":"Enter the user logon name.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>This name must be unique within the domain. (Don’t worry, if you try to use a name that isn’t unique, you’ll get an error message.)</p>\n<p>Pick a naming scheme to follow when creating user logon names. You can use the first letter of the first name followed by the complete last name, the complete first name followed by the first letter of the last name, or any other scheme that suits your fancy.</p>\n"},{"title":"Click Next.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/user’s-password.jpg","width":220,"height":187},"image":{"src":"https://www.dummies.com/wp-content/uploads/user’s-password.jpg","width":535,"height":456},"content":"<p>The second page of the New Object – User Wizard appears.</p>\n"},{"title":"Enter the password twice.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>You’re asked to enter the password and then confirm it, so type it correctly. If you don’t enter it identically in both boxes, you’re asked to correct your mistake.</p>\n"},{"title":"Specify the password options that you want to apply.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>The following password options are available:</p>\n<ul>\n<li>User Must Change Password at Next Logon</li>\n<li>User Cannot Change Password</li>\n<li>Password Never Expires</li>\n<li>Account Is Disabled</li>\n</ul>\n"},{"title":"Click Next.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>You’re taken to the final page of the New Object – User Wizard.</p>\n"},{"title":"Verify that the information is correct and then click Finish to create the account.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/user-account-information.jpg","width":220,"height":187},"image":{"src":"https://www.dummies.com/wp-content/uploads/user-account-information.jpg","width":535,"height":456},"content":"<p>If the account information isn’t correct, click the Back button, and correct the error.</p>\n<p>You’re done! Now you can customize the user’s account settings. At minimum, you’ll probably want to add the user to one or more groups. You may also want to add contact information for the user or set up other account options.</p>\n<p>An alternative way to create a new user is simply to copy an existing user. When you copy an existing user, you provide a new username and password and Windows copies all the other property settings from the existing user to the new user.</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":222508},{"headers":{"creationTime":"2016-03-26T15:27:52+00:00","modifiedTime":"2021-12-27T18:52:29+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"How to Manage a Network Server Remotely","strippedTitle":"how to manage a network server remotely","slug":"how-to-manage-a-network-server-remotely","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"One of the most useful tools available to system administrators is a program called <i>Remote Desktop Connection</i>. Remote Desktop Connection lets you connect to a server computer from your own computer's desktop and use it as though you were actually sitting at the server. The program enables you to manage your servers from the comfort of your own office, without having to walk down to the server room.\r\n<p class=\"Tip\">Remote Desktop Connection is especially important if you're using virtual servers. Because virtual servers have no real hardware, including keyboards, mice, or monitors, Remote Desktop Connection is the primary way you interact with them.</p>\r\nBefore you can use Remote Desktop Connection to access a server, you must enable remote access on the server. You can do that from the System Properties dialog box. Here are the steps:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Open the Control Panel.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Double-click System.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Remote Settings link.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Remote Tab.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Select the Allow Remote Connections to This Computer radio button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click OK.</p>\r\n<img class=\"alignnone size-full wp-image-290026\" src=\"https://www.dummies.com/wp-content/uploads/System-properties.jpg\" alt=\"Windows remote desktop window\" width=\"410\" height=\"466\" /></li>\r\n</ol>\r\nAll versions of Windows come with a program called the <i>Remote Desktop Client, </i>which you can use to connect to a server remotely. Here are the steps for Windows 7:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Click the Start button, type the word Remote, and then click the Remote Desktop Connection icon.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Enter the name of the server you want to connect to.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Connect button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Log on and use the server.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/366885.image1.png\" alt=\"image1.png\" width=\"421\" height=\"259\" /></li>\r\n</ol>","description":"One of the most useful tools available to system administrators is a program called <i>Remote Desktop Connection</i>. Remote Desktop Connection lets you connect to a server computer from your own computer's desktop and use it as though you were actually sitting at the server. The program enables you to manage your servers from the comfort of your own office, without having to walk down to the server room.\r\n<p class=\"Tip\">Remote Desktop Connection is especially important if you're using virtual servers. Because virtual servers have no real hardware, including keyboards, mice, or monitors, Remote Desktop Connection is the primary way you interact with them.</p>\r\nBefore you can use Remote Desktop Connection to access a server, you must enable remote access on the server. You can do that from the System Properties dialog box. Here are the steps:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Open the Control Panel.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Double-click System.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Remote Settings link.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Remote Tab.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Select the Allow Remote Connections to This Computer radio button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click OK.</p>\r\n<img class=\"alignnone size-full wp-image-290026\" src=\"https://www.dummies.com/wp-content/uploads/System-properties.jpg\" alt=\"Windows remote desktop window\" width=\"410\" height=\"466\" /></li>\r\n</ol>\r\nAll versions of Windows come with a program called the <i>Remote Desktop Client, </i>which you can use to connect to a server remotely. Here are the steps for Windows 7:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Click the Start button, type the word Remote, and then click the Remote Desktop Connection icon.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Enter the name of the server you want to connect to.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Connect button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Log on and use the server.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/366885.image1.png\" alt=\"image1.png\" width=\"421\" height=\"259\" /></li>\r\n</ol>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb482fa31\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4830417\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":168520},{"headers":{"creationTime":"2016-03-27T16:49:39+00:00","modifiedTime":"2021-12-27T18:39:23+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Networking For Dummies Cheat Sheet","strippedTitle":"networking for dummies cheat sheet","slug":"networking-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Get to know some networking basics such as pin connections and IP address ranges — and become familiar with useful websites for networking information.","noIndex":0,"noFollow":0},"content":"Managing a small computer network is well within your reach, but it's vital to track key information that's unique to your network. Begin by recording your network and Internet connection information in one place, making it easy to find and readily available when you need it. Then, get to know some of the basic networking concepts such as pin connections and IP address ranges — and become familiar with useful websites for networking information.\r\n\r\n[caption id=\"attachment_269748\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-269748\" src=\"https://www.dummies.com/wp-content/uploads/networking-concept.jpg\" alt=\"network illustration\" width=\"556\" height=\"371\" /> ©hywards/Shutterstock.com[/caption]","description":"Managing a small computer network is well within your reach, but it's vital to track key information that's unique to your network. Begin by recording your network and Internet connection information in one place, making it easy to find and readily available when you need it. Then, get to know some of the basic networking concepts such as pin connections and IP address ranges — and become familiar with useful websites for networking information.\r\n\r\n[caption id=\"attachment_269748\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-269748\" src=\"https://www.dummies.com/wp-content/uploads/networking-concept.jpg\" alt=\"network illustration\" width=\"556\" height=\"371\" /> ©hywards/Shutterstock.com[/caption]","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}},{"articleId":184875,"title":"The Many Types of Firewalls on a Network","slug":"the-many-types-of-firewalls-on-a-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/184875"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4823a03\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb48243c4\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":168547,"title":"Tracking Key Network Information","slug":"tracking-key-network-information","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/168547"}},{"articleId":168548,"title":"Tracking Key Internet Connection Information","slug":"tracking-key-internet-connection-information","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/168548"}},{"articleId":168525,"title":"RJ-45 Pin Connections for Your TCP/IP Network","slug":"rj-45-pin-connections-for-your-tcpip-network","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/168525"}},{"articleId":168546,"title":"Private IP Address Ranges for Networks","slug":"private-ip-address-ranges-for-networks","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/168546"}},{"articleId":168555,"title":"Useful Websites for Networking Information","slug":"useful-websites-for-networking-information","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/168555"}}],"content":[{"title":"Tracking Key Network Information","thumb":null,"image":null,"content":"<p>Fill in these tables to keep track of the key information that allows you to access your network, contact your network administrator, access network storage, use network printers, and oversee important network servers.</p>\n<table>\n<caption><strong>Account Information</strong></caption>\n<tbody>\n<tr>\n<td><i>My user ID</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n<tr>\n<td><i>My password</i></td>\n<td>Don&#8217;t write it here! (Memorize it or keep it in a safe place,<br />\nseparate from associated information.)</td>\n</tr>\n<tr>\n<td><i>Domain name</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n<tr>\n<td><i>My e-mail address</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>My Network Administrator</strong></caption>\n<tbody>\n<tr>\n<td><i>Name</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n<tr>\n<td><i>Phone number</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n<tr>\n<td><i>E-mail name</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n<tr>\n<td><i>Favorite snack food</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>My Network Drives</strong></caption>\n<tbody>\n<tr>\n<th>Drive Letter</th>\n<th>Description</th>\n</tr>\n<tr>\n<td><i>___</i></td>\n<td>__________________________________________________________________</td>\n</tr>\n<tr>\n<td><i>___</i></td>\n<td>__________________________________________________________________</td>\n</tr>\n<tr>\n<td><i>___</i></td>\n<td>__________________________________________________________________</td>\n</tr>\n<tr>\n<td><i>___</i></td>\n<td>__________________________________________________________________</td>\n</tr>\n<tr>\n<td><i>___</i></td>\n<td><i>__________________________________________________________________</i></td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>My Network Printers</strong></caption>\n<tbody>\n<tr>\n<th>Printer Name</th>\n<th>IP Address</th>\n<th>Description</th>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td>________________________________________________</td>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td>________________________________________________</td>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td>________________________________________________</td>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td>________________________________________________</td>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td>________________________________________________</td>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td><i>________________________________________________</i></td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>My Network Servers</strong></caption>\n<tbody>\n<tr>\n<th>Server Name</th>\n<th>IP Address</th>\n<th>Description</th>\n</tr>\n<tr>\n<td><i>____________</i></td>\n<td><i>________</i></td>\n<td>_____________________________________________</td>\n</tr>\n<tr>\n<td><i>____________</i></td>\n<td><i>________</i></td>\n<td>_____________________________________________</td>\n</tr>\n<tr>\n<td><i>____________</i></td>\n<td><i>________</i></td>\n<td>_____________________________________________</td>\n</tr>\n<tr>\n<td><i>____________</i></td>\n<td><i>________</i></td>\n<td><i>_____________________________________________</i></td>\n</tr>\n</tbody>\n</table>\n"},{"title":"Tracking Key Internet Connection Information","thumb":null,"image":null,"content":"<p>Use these spaces to keep track of key information about your Internet connection, including your Internet service provider, your TCP/IP configuration, and information about your router.</p>\n<table>\n<caption><strong>Provider</strong></caption>\n<tbody>\n<tr>\n<td>Company name</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Technical-support contact</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Technical-support phone number</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Website</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>E-mail address</td>\n<td>____________________________________</td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>TCP/IP Information</strong></caption>\n<tbody>\n<tr>\n<td>IP range</td>\n<td>________________ to ________________</td>\n</tr>\n<tr>\n<td>Subnet mask</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Default gateway</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Nameservers</td>\n<td>__________ — __________ — __________</td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>Router Information</strong></caption>\n<tbody>\n<tr>\n<td>Make and model</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Internal IP address (LAN)</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>External IP address (WAN)</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Administrator username</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Password</td>\n<td><i>Don&#8217;t write it here!</i> <i></i><i>(Memorize it or keep it<br />\nin a safe place, separate from associated information.)</i></td>\n</tr>\n</tbody>\n</table>\n"},{"title":"RJ-45 Pin Connections for Your TCP/IP Network","thumb":null,"image":null,"content":"<p>If you&#8217;re wiring up your own RJ-45 connectors for a TCP/IP network, you need this information to make sure you connect the pins correctly. Colors make identification easy:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>Pin 1:</b> White/orange</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Pin 2:</b> Orange</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Pin 3:</b> White/green</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Pin 6:</b> Green</p>\n</li>\n</ul>\n"},{"title":"Private IP Address Ranges for Networks","thumb":null,"image":null,"content":"<p>Private IP (Internet protocol) address blocks are the IP addresses most often used for private networks. Most networks use addresses in one of these ranges:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><span class=\"code\">10.0.0.0</span> to <span class=\"code\">10.255.255.255</span></p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">172.16.0.0</span> to <span class=\"code\">172.31.255.255</span></p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">192.168.0.0</span> to <span class=\"code\">192.168.255.255</span></p>\n</li>\n</ul>\n"},{"title":"Useful Websites for Networking Information","thumb":null,"image":null,"content":"<p>As a network administrator, the Internet is your best friend for networking resources, solutions, news, and guidance. Here are some websites for you to visit often.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>To register domains:</b></p>\n<p class=\"child-para\"><a href=\"http://www.internic.net/\" target=\"_blank\" rel=\"noopener\">InterNIC</a><u></u></p>\n<p class=\"child-para\"><a href=\"http://www.networksolutions.com/\" target=\"_blank\" rel=\"noopener\">Network Solutions</a></p>\n<p class=\"child-para\"><a href=\"http://www.register.com\" target=\"_blank\" rel=\"noopener\">register.com</a></p>\n</li>\n<li>\n<p class=\"first-para\"><b>To check your TCP/IP configuration: </b><a href=\"https://www.dnsstuff.com/freetools\" target=\"_blank\" rel=\"noopener\">DNSstuff</a></p>\n</li>\n<li>\n<p class=\"first-para\"><b>To see if your e-mail server has been blacklisted: </b><a href=\"http://www.dnsbl.info\" target=\"_blank\" rel=\"noopener\">DNSBL.info</a></p>\n</li>\n<li>\n<p class=\"first-para\"><b>To stay current in the industry, try these standards organizations:</b></p>\n<p class=\"child-para\"><a href=\"http://www.ieee.org\" target=\"_blank\" rel=\"noopener\">Institute of Electrical and Electronics Engineers</a></p>\n<p class=\"child-para\"><a href=\"http://www.iso.org\" target=\"_blank\" rel=\"noopener\">International Organization for Standardization</a></p>\n<p class=\"child-para\"><a href=\"http://www.ietf.org\" target=\"_blank\" rel=\"noopener\">Internet Engineering Task Force</a></p>\n<p class=\"child-para\"><a href=\"http://www.isoc.org\" target=\"_blank\" rel=\"noopener\">Internet Society</a></p>\n</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":208013},{"headers":{"creationTime":"2016-03-26T14:44:57+00:00","modifiedTime":"2021-12-27T17:52:37+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Configuring Windows Network Connections","strippedTitle":"configuring windows network connections","slug":"network-connection-configuration-windows-xp","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"Windows usually detects the presence of a network adapter automatically. When Windows detects a network adapter, Windows automatically creates a network connection and configures it to support basic networking protocols. You may need to change the configuration of a network connection manually, however.\r\n\r\nThe following steps show how to configure your network connection on a Windows 10 system:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Click the Start icon (or press the Start button on the keyboard), and then tap or click Settings.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click Network & Internet.</p>\r\n<p class=\"child-para\">The Network and Internet page appears, as show in the figure below.</p>\r\n<img class=\"alignnone size-full wp-image-290029\" src=\"https://www.dummies.com/wp-content/uploads/windows-network-and-internet-settings-window.jpg\" alt=\"Windows Network and Internet Settings window\" width=\"630\" height=\"497\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Click Ethernet.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"></p>\r\n<p class=\"child-para\">Click Change Adapter Options.\r\nThe Network Connections page appears, as shown in the figure below.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380516.image1.jpg\" alt=\"image1.jpg\" width=\"331\" height=\"400\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Right-click the connection that you want to configure and then choose Properties from the contextual menu that appears.</p>\r\n<p class=\"child-para\">This action opens the Ethernet Properties dialog box. This dialog box has seven tabs that let you configure the adapter:</p>\r\n\r\n<ul class=\"level-two\">\r\n \t<li>\r\n<p class=\"first-para\"><i>General:</i> This tab shows basic information about the NIC, such as the device type and status. For example, the device shown is an Intel Pro 100 network interface.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><i>Advanced:</i> From this tab, you can set a variety of device-specific parameters that affect the operation of the NIC. In most cases, you should leave the options on this tab alone.</p>\r\n</li>\r\n \t<li><em>About</em>: Displays information about the device's patent protection</li>\r\n \t<li>\r\n<p class=\"first-para\"><i>Driver:</i> This tab displays information about the device driver that’s bound to the NIC and lets you update the driver to a newer version, roll back the driver to a previously working version, or uninstall the driver.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><em>Details</em>: With this tab, you can inspect various properties of the adapter, such as the date and version of the device driver. To view the setting of a particular property, select the property name from the drop-down list.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><em>Events</em>: Lists recent events that have been logged for the device</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Power Management: Lets you configure power management options for the device</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380517.image2.jpg\" alt=\"image2.jpg\" width=\"361\" height=\"400\" /></li>\r\n</ul>\r\n<p class=\"child-para\">When you click OK to dismiss the network adapter’s Properties dialog box, the network connection’s Properties dialog box closes and you're returned to the Network Connections page. Right-click the network adapter and choose Properties again to continue the procedure.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">To configure TCP/IP settings, click Internet Protocol Version 4 (TCP/IPv4) and then click Properties to display the TCP/IP Properties dialog box. Adjust the settings and then click OK.</p>\r\n<p class=\"child-para\">The TCP/IP Properties dialog box lets you choose among these options:</p>\r\n\r\n<ul class=\"level-two\">\r\n \t<li>\r\n<p class=\"first-para\"><i>Obtain an IP Address Automatically:</i> Choose this option if your network has a DHCP server that assigns IP addresses automatically. Choosing this option dramatically simplifies administering TCP/IP on your network.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><i>Use the Following IP Address:</i> If your computer must have a specific IP address, choose this option and then type the computer’s IP address, subnet mask, and default gateway address.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><i>Obtain DNS Server Address Automatically:</i> The DHCP server can also provide the address of the Domain Name System (DNS) server that the computer should use. Choose this option if your network has a DHCP server.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><i>Use the Following DNS Server Addresses:</i> Choose this option if a DNS server isn’t available. Then type the IP addresses of the primary and secondary DNS servers.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380518.image3.jpg\" alt=\"image3.jpg\" width=\"361\" height=\"400\" /></li>\r\n</ul>\r\n</li>\r\n</ol>","description":"Windows usually detects the presence of a network adapter automatically. When Windows detects a network adapter, Windows automatically creates a network connection and configures it to support basic networking protocols. You may need to change the configuration of a network connection manually, however.\r\n\r\nThe following steps show how to configure your network connection on a Windows 10 system:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Click the Start icon (or press the Start button on the keyboard), and then tap or click Settings.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click Network & Internet.</p>\r\n<p class=\"child-para\">The Network and Internet page appears, as show in the figure below.</p>\r\n<img class=\"alignnone size-full wp-image-290029\" src=\"https://www.dummies.com/wp-content/uploads/windows-network-and-internet-settings-window.jpg\" alt=\"Windows Network and Internet Settings window\" width=\"630\" height=\"497\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Click Ethernet.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"></p>\r\n<p class=\"child-para\">Click Change Adapter Options.\r\nThe Network Connections page appears, as shown in the figure below.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380516.image1.jpg\" alt=\"image1.jpg\" width=\"331\" height=\"400\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Right-click the connection that you want to configure and then choose Properties from the contextual menu that appears.</p>\r\n<p class=\"child-para\">This action opens the Ethernet Properties dialog box. This dialog box has seven tabs that let you configure the adapter:</p>\r\n\r\n<ul class=\"level-two\">\r\n \t<li>\r\n<p class=\"first-para\"><i>General:</i> This tab shows basic information about the NIC, such as the device type and status. For example, the device shown is an Intel Pro 100 network interface.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><i>Advanced:</i> From this tab, you can set a variety of device-specific parameters that affect the operation of the NIC. In most cases, you should leave the options on this tab alone.</p>\r\n</li>\r\n \t<li><em>About</em>: Displays information about the device's patent protection</li>\r\n \t<li>\r\n<p class=\"first-para\"><i>Driver:</i> This tab displays information about the device driver that’s bound to the NIC and lets you update the driver to a newer version, roll back the driver to a previously working version, or uninstall the driver.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><em>Details</em>: With this tab, you can inspect various properties of the adapter, such as the date and version of the device driver. To view the setting of a particular property, select the property name from the drop-down list.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><em>Events</em>: Lists recent events that have been logged for the device</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Power Management: Lets you configure power management options for the device</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380517.image2.jpg\" alt=\"image2.jpg\" width=\"361\" height=\"400\" /></li>\r\n</ul>\r\n<p class=\"child-para\">When you click OK to dismiss the network adapter’s Properties dialog box, the network connection’s Properties dialog box closes and you're returned to the Network Connections page. Right-click the network adapter and choose Properties again to continue the procedure.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">To configure TCP/IP settings, click Internet Protocol Version 4 (TCP/IPv4) and then click Properties to display the TCP/IP Properties dialog box. Adjust the settings and then click OK.</p>\r\n<p class=\"child-para\">The TCP/IP Properties dialog box lets you choose among these options:</p>\r\n\r\n<ul class=\"level-two\">\r\n \t<li>\r\n<p class=\"first-para\"><i>Obtain an IP Address Automatically:</i> Choose this option if your network has a DHCP server that assigns IP addresses automatically. Choosing this option dramatically simplifies administering TCP/IP on your network.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><i>Use the Following IP Address:</i> If your computer must have a specific IP address, choose this option and then type the computer’s IP address, subnet mask, and default gateway address.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><i>Obtain DNS Server Address Automatically:</i> The DHCP server can also provide the address of the Domain Name System (DNS) server that the computer should use. Choose this option if your network has a DHCP server.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><i>Use the Following DNS Server Addresses:</i> Choose this option if a DNS server isn’t available. Then type the IP addresses of the primary and secondary DNS servers.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380518.image3.jpg\" alt=\"image3.jpg\" width=\"361\" height=\"400\" /></li>\r\n</ul>\r\n</li>\r\n</ol>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb481b96a\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb481c32d\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":164963},{"headers":{"creationTime":"2016-03-26T14:44:51+00:00","modifiedTime":"2021-12-27T16:51:02+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"How to Enable File and Printer Sharing (Windows 7, 8, and 10)","strippedTitle":"how to enable file and printer sharing (windows 7, 8, and 10)","slug":"how-to-enable-file-and-printer-sharing-windows-7-and-8","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"You can turn your humble Windows client computer running Windows 7, 8, or 10 into a server computer so that other computers on your network can use your printer and any folders that you decide you want to share. In effect, your computer functions as both a client and a server at the same time. A couple of examples show how:\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">It’s a <b>client</b> when you send a print job to a network printer or when you access a file stored on another server’s hard drive.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">It’s a <b>server</b> when someone else sends a print job to your printer or accesses a file stored on your computer’s hard drive.</p>\r\n</li>\r\n</ul>\r\nHere are the steps to enable file and printer sharing in Windows 7, 8, and 10:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Click the Start button, type Control Panel, and press Enter.</p>\r\n<p class=\"child-para\">This step opens the Control Panel.</p>\r\n</li>\r\n \t<li>Click the Network and Internet icon.</li>\r\n \t<li>\r\n<p class=\"first-para\">Double-click the Network and Sharing Center icon and then click Change Advanced Sharing Settings.</p>\r\n<p class=\"child-para\">This step opens the Advanced Sharing Settings page, which lists network settings for each network you’re connected to.</p>\r\n\r\n<ul class=\"level-two\">\r\n \t<li>\r\n<p class=\"first-para\">For a home computer running Windows 7: Two networks are listed: Home or Work, and Public.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">In Windows 8 and 10: The Home or Work network is called Private.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">For a computer connected to a domain network: A third network named Domain is listed.</p>\r\n</li>\r\n</ul>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the down arrow next to the network you want to enable file and printer sharing for.</p>\r\n\r\n<ul class=\"level-two\">\r\n \t<li>\r\n<p class=\"first-para\">For a home computer: Click the down arrow next to Home or Work (Windows 7) or Private (Windows 8 and 10).</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">For a computer connected to a domain network: Click the down arrow next to Domain.</p>\r\n</li>\r\n</ul>\r\n<p class=\"child-para\">The figure shows the settings for a Domain network. The settings for a Home or Work network are the same.</p>\r\n<p class=\"child-para\">Do <i>not </i>enable file or printer sharing for the Public network. Enabling file or printer sharing on a public network exposes your computer’s data to other users on the same public network.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380496.image0.jpg\" alt=\"image0.jpg\" width=\"533\" height=\"400\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Select the Turn on File and Printer Sharing option.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Save Changes button.</p>\r\n<p class=\"child-para\">This action saves your changes and closes the Advanced Sharing Settings page.</p>\r\n</li>\r\n</ol>","description":"You can turn your humble Windows client computer running Windows 7, 8, or 10 into a server computer so that other computers on your network can use your printer and any folders that you decide you want to share. In effect, your computer functions as both a client and a server at the same time. A couple of examples show how:\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">It’s a <b>client</b> when you send a print job to a network printer or when you access a file stored on another server’s hard drive.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">It’s a <b>server</b> when someone else sends a print job to your printer or accesses a file stored on your computer’s hard drive.</p>\r\n</li>\r\n</ul>\r\nHere are the steps to enable file and printer sharing in Windows 7, 8, and 10:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Click the Start button, type Control Panel, and press Enter.</p>\r\n<p class=\"child-para\">This step opens the Control Panel.</p>\r\n</li>\r\n \t<li>Click the Network and Internet icon.</li>\r\n \t<li>\r\n<p class=\"first-para\">Double-click the Network and Sharing Center icon and then click Change Advanced Sharing Settings.</p>\r\n<p class=\"child-para\">This step opens the Advanced Sharing Settings page, which lists network settings for each network you’re connected to.</p>\r\n\r\n<ul class=\"level-two\">\r\n \t<li>\r\n<p class=\"first-para\">For a home computer running Windows 7: Two networks are listed: Home or Work, and Public.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">In Windows 8 and 10: The Home or Work network is called Private.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">For a computer connected to a domain network: A third network named Domain is listed.</p>\r\n</li>\r\n</ul>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the down arrow next to the network you want to enable file and printer sharing for.</p>\r\n\r\n<ul class=\"level-two\">\r\n \t<li>\r\n<p class=\"first-para\">For a home computer: Click the down arrow next to Home or Work (Windows 7) or Private (Windows 8 and 10).</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">For a computer connected to a domain network: Click the down arrow next to Domain.</p>\r\n</li>\r\n</ul>\r\n<p class=\"child-para\">The figure shows the settings for a Domain network. The settings for a Home or Work network are the same.</p>\r\n<p class=\"child-para\">Do <i>not </i>enable file or printer sharing for the Public network. Enabling file or printer sharing on a public network exposes your computer’s data to other users on the same public network.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380496.image0.jpg\" alt=\"image0.jpg\" width=\"533\" height=\"400\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Select the Turn on File and Printer Sharing option.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Save Changes button.</p>\r\n<p class=\"child-para\">This action saves your changes and closes the Advanced Sharing Settings page.</p>\r\n</li>\r\n</ol>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4813540\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4813efe\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":164955}],"_links":{"self":{"self":"https://dummies-api.dummies.com/v2/categories/33585/categoryArticles?sortField=time&sortOrder=1&size=10&offset=0"},"next":{"self":"https://dummies-api.dummies.com/v2/categories/33585/categoryArticles?sortField=time&sortOrder=1&size=10&offset=10"},"last":{"self":"https://dummies-api.dummies.com/v2/categories/33585/categoryArticles?sortField=time&sortOrder=1&size=10&offset=145"}}},"objectTitle":"","status":"success","pageType":"article-category","objectId":"33585","page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{"categoriesFilter":[{"itemId":0,"itemName":"All Categories","count":154}],"articleTypeFilter":[{"articleType":"All Types","count":154},{"articleType":"Articles","count":139},{"articleType":"Cheat Sheet","count":4},{"articleType":"Step by Step","count":10},{"articleType":"Videos","count":1}]},"filterDataLoadedStatus":"success","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2022-05-23T18:59:07+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"https://cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"https://sb\" : \"http://b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"https://sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"https://zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for http://www.dummies.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'https://static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"https://www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":[],"relatedArticlesStatus":"initial"},"routeState":{"name":"ArticleCategory","path":"/category/articles/general-networking-33585/","hash":"","query":{},"params":{"category":"general-networking-33585"},"fullPath":"/category/articles/general-networking-33585/","meta":{"routeType":"category","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"sfmcState":{"newsletterSignupStatus":"initial"}}
Logo
  • Articles Open Article Categories
  • Books Open Book Categories
  • Collections Open Collections list
  • Custom Solutions
  • Home
  • Technology Articles
  • Information Technology Articles
  • Networking Articles
  • General (Networking) Articles

General (Networking) Articles

From virtual networks to GIS and IT architecture, our networking articles take a bunch of acronyms and make 'em understandable to the average human.

Articles From General (Networking)

page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16

Filter Results

155 results
155 results
General (Networking) Cisco Networking All-in-One For Dummies Cheat Sheet

Cheat Sheet / Updated 03-01-2022

To create and configure a Cisco network, you need to know about routers and switches to develop and manage secure Cisco systems. Become acquainted with Cisco network devices and code listings; and find out how to manage static routing and view routing information.

View Cheat Sheet
General (Networking) TCP/IP For Dummies Cheat Sheet

Cheat Sheet / Updated 02-28-2022

As a network administrator, you know that TCP/IP is the glue that holds the Internet and the Web together. As well as being familiar with security terms and general definitions, you need to pay attention to RFCs (Requests for Comment) published by the Internet Engineering Task Force. You can comment on, learn from, and submit RFCs yourself.

View Cheat Sheet
General (Networking) Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet

Cheat Sheet / Updated 02-03-2022

PowerShell 5.1 is the version of Windows PowerShell that ships with Windows Server 2022, Windows Server 2019, and Windows Server 2016. It’s available for installation on Windows Server 2008 R2 with Service Pack1, Windows Server 2012, and Windows Server 2012 R2. The last three operating systems must have Windows Management Framework 5.1 installed to support PowerShell 5.1. You can upgrade to PowerShell 7.2 fairly easily (the more recent version from Microsoft), though the examples on this Cheat Sheet were only tested in PowerShell 5.1.

View Cheat Sheet
General (Networking) Network Administration: Granting Share Permissions

Article / Updated 12-27-2021

When you first create a file share on your network, all users are granted read-only access to the share. If you want to allow users to modify files in the share or allow them to create new files, you need to add permissions. Here’s how to do this using Windows Explorer: Open Windows Explorer by pressing the Windows key and clicking Computer; then browse to the folder whose permissions you want to manage. Right-click the folder you want to manage and then choose Properties from the contextual menu. The Properties dialog box for the folder appears. Click the Sharing tab; then click Advanced Sharing. The Advanced Sharing dialog box appears. Click Permissions. The dialog box shown appears. This dialog box lists all the users and groups to whom you’ve granted permission for the folder. Initially, read permissions are granted to a group called Everyone, which means that anyone can view files in the share but no one can create, modify, or delete files in the share. When you select a user or group from the list, the check boxes at the bottom of the list change to indicate which specific permissions you’ve assigned to each user or group. Click the Add button. The dialog box shown appears. Enter the name of the user or group to whom you want to grant permission and then click OK. If you’re not sure of the name, click the Advanced button. This action brings up a dialog box from which you can search for existing users. When you click OK, you return to the Share Permissions tab, with the new user or group added. Select the appropriate Allow and Deny check boxes to specify which permissions to allow for the user or group. Repeat Steps 5–7 for any other permissions that you want to add. When you’re done, click OK. Here are a few other thoughts to ponder concerning adding permissions: If you want to grant full access to everyone for this folder, don’t bother adding another permission. Instead, select the Everyone group and then select the Allow check box for each permission type. You can remove a permission by selecting the permission and then clicking the Remove button. If you’d rather not fuss with the Share and Storage Management console, you can set the permissions from My Computer. Right-click the shared folder, choose Sharing and Security from the contextual menu, and then click Permissions. Then you can follow the preceding procedure, picking up at Step 5. The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is most restrictive always applies. If the share permissions grant a user Full Control permission but the folder permission grants the user only Read permission, for example, the user has only Read permission for the folder.

View Article
General (Networking) Using Workgroup Templates Across Your Network

Article / Updated 12-27-2021

Although an occasional sacrifice to the Office gods may make your networking life a bit easier, a template isn’t a place of worship. Rather, a template is a special type of document file that holds formatting information, boilerplate text, and other customized settings that you can use as the basis for new documents. Three Office programs — Word, Excel, and PowerPoint — enable you to specify a template whenever you create a new document. When you create a new document in Word, Excel, or PowerPoint by choosing File → New, you see a dialog box that lets you choose a template for the new document. Office comes with a set of templates for the most common types of documents. These templates are grouped under the various tabs that appear across the top of the New dialog box. In addition to the templates that come with Office, you can create your own templates in Word, Excel, and PowerPoint. Creating your own templates is especially useful if you want to establish a consistent look for documents prepared by your network users. For example, you can create a Letter template that includes your company’s letterhead or a Proposal template that includes a company logo. Office enables you to store templates in two locations. Where you put them depends on what you want to do with them: The User Templates folder on each user’s local disk drive: If a particular user needs a specialized template, put it here. The Workgroup Templates folder on a shared network drive: If you have templates that you want to make available to all network users on the network server, put them here. This arrangement still allows each user to create templates that aren’t available to other network users. When you use both a User Templates folder and a Workgroup Templates folder, Office combines the templates from both folders and lists them in alphabetical order in the New dialog box. For example, the User Templates folder may contain templates named Blank Document and web Page, and the Workgroup Templates folder may contain a template named Company Letterhead. In this case, three templates appear in the New dialog box, in this order: Blank Document, Company Letterhead, and web Page. To set the location of the User Templates and Workgroup Templates folders, follow these steps in Microsoft Word: In Word, create a new document or open an existing document. It doesn't matter which document you use. This step is required simply because word doesn't let you access the template folder locations unless a document is open. Choose File, and then Options. The Word Options dialog box opens. Click the Advanced tab. The Advanced options appear. Scroll down to the General section and then click the File Locations button. The File Locations dialog box appears. Double-click the Workgroup Templates item. This step opens a dialog box that lets you browse to the location of your template files. Browse to the template files and then click OK. You return to the File Locations dialog box. Click OK to dismiss the File Locations dialog box. You return to the Word Options dialog box. Click OK again. The Word Options dialog box is dismissed. Although the User Templates and Workgroup Templates settings affect Word, Excel, and PowerPoint, you can change these settings only from Word. The Options dialog boxes in Excel and PowerPoint don’t show the User Templates or Workgroup Templates options. When you install Office, the standard templates that come with Office are copied into a folder on the computer’s local disk drive, and the User Templates option is set to this folder. The Workgroup Templates option is left blank. You can set the Workgroup Templates folder to a shared network folder by clicking Network Templates, clicking the Modify button, and specifying a shared network folder that contains your workgroup templates.

View Article
General (Networking) Network Administration: How to Create a New User in Active Directory

Step by Step / Updated 12-27-2021

User accounts are among the basic tools for managing a Windows server. As a network administrator, you’ll spend a large percentage of your time dealing with user accounts To create a new domain user account in Active Directory, follow these steps:

View Step by Step
General (Networking) How to Manage a Network Server Remotely

Article / Updated 12-27-2021

One of the most useful tools available to system administrators is a program called Remote Desktop Connection. Remote Desktop Connection lets you connect to a server computer from your own computer's desktop and use it as though you were actually sitting at the server. The program enables you to manage your servers from the comfort of your own office, without having to walk down to the server room. Remote Desktop Connection is especially important if you're using virtual servers. Because virtual servers have no real hardware, including keyboards, mice, or monitors, Remote Desktop Connection is the primary way you interact with them. Before you can use Remote Desktop Connection to access a server, you must enable remote access on the server. You can do that from the System Properties dialog box. Here are the steps: Open the Control Panel. Double-click System. Click the Remote Settings link. Click the Remote Tab. Select the Allow Remote Connections to This Computer radio button. Click OK. All versions of Windows come with a program called the Remote Desktop Client, which you can use to connect to a server remotely. Here are the steps for Windows 7: Click the Start button, type the word Remote, and then click the Remote Desktop Connection icon. Enter the name of the server you want to connect to. Click the Connect button. Log on and use the server.

View Article
General (Networking) Networking For Dummies Cheat Sheet

Cheat Sheet / Updated 12-27-2021

Managing a small computer network is well within your reach, but it's vital to track key information that's unique to your network. Begin by recording your network and Internet connection information in one place, making it easy to find and readily available when you need it. Then, get to know some of the basic networking concepts such as pin connections and IP address ranges — and become familiar with useful websites for networking information.

View Cheat Sheet
General (Networking) Configuring Windows Network Connections

Article / Updated 12-27-2021

Windows usually detects the presence of a network adapter automatically. When Windows detects a network adapter, Windows automatically creates a network connection and configures it to support basic networking protocols. You may need to change the configuration of a network connection manually, however. The following steps show how to configure your network connection on a Windows 10 system: Click the Start icon (or press the Start button on the keyboard), and then tap or click Settings. Click Network & Internet. The Network and Internet page appears, as show in the figure below. Click Ethernet. Click Change Adapter Options. The Network Connections page appears, as shown in the figure below. Right-click the connection that you want to configure and then choose Properties from the contextual menu that appears. This action opens the Ethernet Properties dialog box. This dialog box has seven tabs that let you configure the adapter: General: This tab shows basic information about the NIC, such as the device type and status. For example, the device shown is an Intel Pro 100 network interface. Advanced: From this tab, you can set a variety of device-specific parameters that affect the operation of the NIC. In most cases, you should leave the options on this tab alone. About: Displays information about the device's patent protection Driver: This tab displays information about the device driver that’s bound to the NIC and lets you update the driver to a newer version, roll back the driver to a previously working version, or uninstall the driver. Details: With this tab, you can inspect various properties of the adapter, such as the date and version of the device driver. To view the setting of a particular property, select the property name from the drop-down list. Events: Lists recent events that have been logged for the device Power Management: Lets you configure power management options for the device When you click OK to dismiss the network adapter’s Properties dialog box, the network connection’s Properties dialog box closes and you're returned to the Network Connections page. Right-click the network adapter and choose Properties again to continue the procedure. To configure TCP/IP settings, click Internet Protocol Version 4 (TCP/IPv4) and then click Properties to display the TCP/IP Properties dialog box. Adjust the settings and then click OK. The TCP/IP Properties dialog box lets you choose among these options: Obtain an IP Address Automatically: Choose this option if your network has a DHCP server that assigns IP addresses automatically. Choosing this option dramatically simplifies administering TCP/IP on your network. Use the Following IP Address: If your computer must have a specific IP address, choose this option and then type the computer’s IP address, subnet mask, and default gateway address. Obtain DNS Server Address Automatically: The DHCP server can also provide the address of the Domain Name System (DNS) server that the computer should use. Choose this option if your network has a DHCP server. Use the Following DNS Server Addresses: Choose this option if a DNS server isn’t available. Then type the IP addresses of the primary and secondary DNS servers.

View Article
General (Networking) How to Enable File and Printer Sharing (Windows 7, 8, and 10)

Article / Updated 12-27-2021

You can turn your humble Windows client computer running Windows 7, 8, or 10 into a server computer so that other computers on your network can use your printer and any folders that you decide you want to share. In effect, your computer functions as both a client and a server at the same time. A couple of examples show how: It’s a client when you send a print job to a network printer or when you access a file stored on another server’s hard drive. It’s a server when someone else sends a print job to your printer or accesses a file stored on your computer’s hard drive. Here are the steps to enable file and printer sharing in Windows 7, 8, and 10: Click the Start button, type Control Panel, and press Enter. This step opens the Control Panel. Click the Network and Internet icon. Double-click the Network and Sharing Center icon and then click Change Advanced Sharing Settings. This step opens the Advanced Sharing Settings page, which lists network settings for each network you’re connected to. For a home computer running Windows 7: Two networks are listed: Home or Work, and Public. In Windows 8 and 10: The Home or Work network is called Private. For a computer connected to a domain network: A third network named Domain is listed. Click the down arrow next to the network you want to enable file and printer sharing for. For a home computer: Click the down arrow next to Home or Work (Windows 7) or Private (Windows 8 and 10). For a computer connected to a domain network: Click the down arrow next to Domain. The figure shows the settings for a Domain network. The settings for a Home or Work network are the same. Do not enable file or printer sharing for the Public network. Enabling file or printer sharing on a public network exposes your computer’s data to other users on the same public network. Select the Turn on File and Printer Sharing option. Click the Save Changes button. This action saves your changes and closes the Advanced Sharing Settings page.

View Article
page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16

Quick Links

  • About For Dummies
  • Contact Us
  • Activate A Book Pin

Connect

Opt in to our newsletter!

By entering your email address and clicking the “Submit” button, you agree to the Terms of Use and Privacy Policy & to receive electronic communications from Dummies.com, which may include marketing promotions, news and updates.

About Dummies

Dummies has always stood for taking on complex concepts and making them easy to understand. Dummies helps everyone be more knowledgeable and confident in applying what they know. Whether it's to pass that big test, qualify for that big promotion or even master that cooking technique; people who rely on dummies, rely on it to learn the critical skills and relevant information necessary for success.

Terms of Use
Privacy Policy
Cookies Settings
Do Not Sell My Personal Info - CA Only