{"appState":{"pageLoadApiCallsStatus":true},"categoryState":{"relatedCategories":{"headers":{"timestamp":"2022-05-13T12:31:06+00:00"},"categoryId":33581,"data":{"title":"Networking","slug":"networking","image":{"src":null,"width":0,"height":0},"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581}],"parentCategory":{"categoryId":33572,"title":"Information Technology","slug":"information-technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"}},"childCategories":[{"categoryId":33582,"title":"Active Directory","slug":"active-directory-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0}},{"categoryId":33583,"title":"Cisco","slug":"cisco","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33583"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0}},{"categoryId":33584,"title":"Cloud Computing","slug":"cloud-computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0}},{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0}}],"description":"All those computers out there in the world? Well, they've gotta talk to one another somehow. We explain how.","relatedArticles":{"self":"https://dummies-api.dummies.com/v2/articles?category=33581&offset=0&size=5"}},"_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"}},"relatedCategoriesLoadedStatus":"success"},"listState":{"list":{"count":10,"total":260,"items":[{"headers":{"creationTime":"2016-12-28T17:31:09+00:00","modifiedTime":"2022-04-20T16:47:31+00:00","timestamp":"2022-04-20T18:01:07+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Cloud Computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"},"slug":"cloud-computing","categoryId":33584}],"title":"AWS For Admins For Dummies Cheat Sheet","strippedTitle":"aws for admins for dummies cheat sheet","slug":"aws-admins-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Amazon Web Services (AWS) is a collection of cloud services that businesses can use to support activities without an IT infrastructure.","noIndex":0,"noFollow":0},"content":"Amazon Web Services (AWS) started out small, but has become a vast collection of cloud services that businesses can use to support any activity without having to invest in an IT infrastructure.","description":"Amazon Web Services (AWS) started out small, but has become a vast collection of cloud services that businesses can use to support any activity without having to invest in an IT infrastructure.","blurb":"","authors":[{"authorId":9109,"name":"John Paul Mueller","slug":"john-paul-mueller","description":"John Paul Mueller has written more than 100 books and more than 600 articles on topics ranging from functional programming techniques to application development using C++. ","_links":{"self":"https://dummies-api.dummies.com/v2/authors/9109"}}],"primaryCategoryTaxonomy":{"categoryId":33584,"title":"Cloud Computing","slug":"cloud-computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":233227,"title":"Elastic Beanstalk (EB) Features for AWS","slug":"elastic-beanstalk-eb-features-aws","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/233227"}},{"articleId":233220,"title":"How to Create an EBS Volume for AWS","slug":"create-ebs-volume-aws","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/233220"}},{"articleId":233217,"title":"Elastic Block Store (EBS) Volume Types for AWS","slug":"elastic-block-store-ebs-volume-types-aws","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/233217"}},{"articleId":233212,"title":"How to Include Inline Policies in AWS with EC2","slug":"include-inline-policies-aws-ec2","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/233212"}},{"articleId":233203,"title":"How to Create Customer-Managed Policies in AWS","slug":"create-customer-managed-policies-aws","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/233203"}}],"fromCategory":[{"articleId":271400,"title":"Planning Your Cloud Computing Strategy","slug":"planning-your-cloud-computing-strategy","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271400"}},{"articleId":271395,"title":"10 Cloud Do’s and Don’ts","slug":"10-cloud-dos-and-donts","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271395"}},{"articleId":271389,"title":"How SaaS Fits into the Multicloud World","slug":"how-saas-fits-into-the-multicloud-world","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271389"}},{"articleId":271384,"title":"Cloud Computing as the Engine of Adaptive Change","slug":"cloud-computing-as-the-engine-of-adaptive-change","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271384"}},{"articleId":271379,"title":"Cloud Computing Elements: Resource Pools/Cloud Models and Services","slug":"cloud-computing-elements-resource-pools-cloud-models-and-services","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271379"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281632,"slug":"aws-for-admins-for-dummies","isbn":"9781119312482","categoryList":["technology","information-technology","networking","cloud-computing"],"amazon":{"default":"https://www.amazon.com/gp/product/1119312485/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119312485/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119312485-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119312485/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119312485/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/aws-for-admins-for-dummies-cover-9781119312482-203x255.jpg","width":203,"height":255},"title":"AWS For Admins For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"9109\">John Paul Mueller</b> is a prolific technical writer and editor with 101 books and 600 articles to his credit. His topics range from networking and home security to database management and heads-down programming, and his editing skills have helped more than 63 authors refine their manuscripts. Visit his blog at http://blog.johnmuellerbooks.com/. </p>","authors":[{"authorId":9109,"name":"John Paul Mueller","slug":"john-paul-mueller","description":"John Paul Mueller has written more than 100 books and more than 600 articles on topics ranging from functional programming techniques to application development using C++. ","_links":{"self":"https://dummies-api.dummies.com/v2/authors/9109"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;cloud-computing&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119312482&quot;]}]\" id=\"du-slot-62604a6330407\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;cloud-computing&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119312482&quot;]}]\" id=\"du-slot-62604a6330d92\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":230918,"title":"A Quick Overview of the Amazon Web Services","slug":"quick-overview-amazon-web-services","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/230918"}},{"articleId":230921,"title":"AWS-Related Command-Line Interface Commands You Should Know","slug":"aws-related-command-line-interface-commands-know","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/230921"}}],"content":[{"title":"A quick overview of the Amazon Web Services","thumb":null,"image":null,"content":"<p>Amazon Web Services (AWS) is all about knowing which service to use. Amazon provides a considerable number of free-tier services that you can try, but some of them are better for experimentation purposes than others are. The following table presents a quick overview of the services best suited to experimentation needs.</p>\n<table>\n<tbody>\n<tr>\n<td width=\"137\"><strong>Service Name</strong></td>\n<td width=\"308\"><strong>Description</strong></td>\n<td width=\"221\"><strong>Console Access URL</strong></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon CloudFront</td>\n<td width=\"308\">Defines a Content Delivery Network (CDN) used to send content from Amazon services to end users. This service supports dynamic, static streaming and interactive content.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/cloudfront/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/cloudfront/</a></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon CloudWatch</td>\n<td width=\"308\">Monitors the AWS cloud resources used by applications that you run on AWS. You can use this service to collect and track metrics, collect and monitor log files, set alarms, and automatically react to changes in your AWS resources. Essentially, this service enables you to track application activity through a variety of methods, such as log files.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/cloudwatch/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/cloudwatch/</a></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon DynamoDB</td>\n<td width=\"308\">Provides access to a NoSQL database service that supports both document and key-value store models. A NoSQL database is a high-speed nonrelational database model that specializes in ease of development, scalable performance, high availability, and resilience.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/dynamodb\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/dynamodb</a></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon Elastic Transcoder</td>\n<td width=\"308\">Converts (transcodes) media files from one format to another, normally to make the media play on devices such as mobile phones, tablets, and PCs.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/elastictranscoder/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/elastictranscoder/</a></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon ElastiCache</td>\n<td width=\"308\">Creates an in-memory data cache that improves application performance by transferring data from a long-term storage service, such as Amazon RDS, to memory. This service supports two open-source, in-memory caching engines: Memcached and Redis</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/elasticache/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/elasticache/</a></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon Elasticsearch Service</td>\n<td width=\"308\">Deploys the open source Elastisearch service, now simply called Elastic (<a href=\"https://www.elastic.co/\" target=\"_blank\" rel=\"noopener\">https://www.elastic.co/</a>) to the AWS cloud where you can use it to perform both search and analysis tasks. Analysis tasks can include checking logs, monitoring applications, and performing clickstream analysis.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/es/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/es/</a></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon Relational Database Service (RDS)</td>\n<td width=\"308\">Allows storage of data objects as part of a relational database. Amazon RDS currently supports six database engines: Amazon Aurora Oracle Microsoft SQL Server PostgreSQL MySQL MariaDB You can also use any combination of RDS General Purpose (SSD) or Magnetic storage.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/rds\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/rds</a></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon Simple Email Service (SES)</td>\n<td width=\"308\">Enables you to send transactional email, marketing messages, or other types of high-quality content as email messages. You can use this service to deliver messages to an Amazon S3 bucket, call custom code using an AWS Lambda function, or publish notifications to Amazon SNS.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/ses/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/ses/</a></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon Simple Notification Service (SNS)</td>\n<td width=\"308\">Creates a publication/subscription model for providing notifications to subscribers. You use this service to deliver messages. This service relies on the Amazon Simple Queue Service (SQS).</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/sns/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/sns/</a></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon Simple Queue Service (SQS)</td>\n<td width=\"308\">Provides a fully managed queuing service. Queuing lets you decouple cloud application components so that components need not run at the same time. This service is often used with Amazon Simple Notification Service (SNS).</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/sqs/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/sqs/</a></td>\n</tr>\n<tr>\n<td width=\"137\">Amazon Simple Storage Service (S3)</td>\n<td width=\"308\">Allows storage of data objects of any sort in the cloud. The three levels of storage enable you to perform short-term (Standard service), middle-tier (Infrequent Access, IA), and long-term storage (Glacier). You can also configure data to the various storage levels based on policies and uses.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/s3/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/s3/</a></td>\n</tr>\n<tr>\n<td width=\"137\">AWS IoT</td>\n<td width=\"308\">Allows connected devices to interact with cloud applications and other devices. Developers can also use this service to add AWS Lambda, Amazon Kinesis, Amazon S3, Amazon Machine Learning, Amazon DynamoDB, Amazon CloudWatch, AWS CloudTrail, and Amazon Elasticsearch Service support to applications.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/iot/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/iot/</a></td>\n</tr>\n<tr>\n<td width=\"137\">AWS Lambda</td>\n<td width=\"308\">Runs custom application code without the need for provisioning or managing servers. You upload the code you want to run, and AWS Lambda does everything needed to run and scale your code with high availability.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/lambda\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/lambda</a></td>\n</tr>\n<tr>\n<td width=\"137\">Database Migration Service</td>\n<td width=\"308\">Makes it possible to transfer data from one kind of database to an entirely different kind of database. Moving data between databases is an essential administration tasks. You can find all sorts of reasons to move data. Some of the most common reasons are a change in database vendor, creating a common platform for all elements of an organization, upgrading to obtain an improved feature set, and a change in platforms (such as moving from a corporate server to the cloud).</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/dms\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/dms</a></td>\n</tr>\n<tr>\n<td width=\"137\">Elastic Beanstalk (EB)</td>\n<td width=\"308\">Creates an environment for working with web applications. A focus of EB is to be able to upload, configure, and manage applications of all sorts with ease. An application isn&#8217;t useful unless people can access it with ease and make it perform whatever tasks it&#8217;s designed to perform in the most seamless manner possible.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/elasticbeanstalk\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/elasticbeanstalk</a></td>\n</tr>\n<tr>\n<td width=\"137\">Elastic Compute Cloud (EC2)</td>\n<td width=\"308\">Provides access to a web service that offers resizable cloud-based compute capacity. You use this service to access virtual server hosting.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/ec2/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/ec2/</a></td>\n</tr>\n<tr>\n<td width=\"137\">Elastic File System (EFS)</td>\n<td width=\"308\">Defines a cloud-based file system for storing data. Most business users are quite familiar with the file system level because they use it to retrieve files when working with applications such as word processors. A file system uses the filing cabinet metaphor, where individual files appear in folders and folders appear in drawers (individual hard drive partitions).</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/efs\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/efs</a></td>\n</tr>\n<tr>\n<td width=\"137\">Glacier</td>\n<td width=\"308\">Provides data archival functionality for data that you no longer need to access actively. Archiving data, the act of moving it from expensive high-speed storage to low-cost, low-speed storage, used to be an act akin to moving paper files from an office to the basement. Someone might use those files sometime, in some way, some day, but not today and possibly not ever.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/glacier/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/glacier/</a></td>\n</tr>\n<tr>\n<td width=\"137\">Identity and Access Management (IAM)</td>\n<td width=\"308\">Helps you configure AWS security for all the services. You use this service to ensure that your other services remain safe and inaccessible to others.</td>\n<td width=\"221\"><a href=\"https://console.aws.amazon.com/iam/\" target=\"_blank\" rel=\"noopener\">https://console.aws.amazon.com/iam/</a></td>\n</tr>\n</tbody>\n</table>\n"},{"title":"AWS-related command-line interface commands you should know","thumb":null,"image":null,"content":"<p>The Command-Line Interface (CLI) presents an uncomfortable environment for many people. Given that the CLI for the Amazon Web Services (AWS) free tier relies on Linux and that many administrators aren&#8217;t familiar with the operating system, the situation becomes even less comfortable.</p>\n<p>However, by using the AWS consoles as much as possible, you can reduce the need for the CLI to a minimum. Even so, you find that some tasks still require the CLI, which is where this handy list of CLI commands comes into play. (Information you must replace with a specific entry appears in italics.)</p>\n<ul>\n<li><strong>cat /proc/mounts:</strong> Displays a list of mounted drives.</li>\n<li><strong>ls:</strong> Lists the contents of a directory. You may optionally provide a directory path to list.</li>\n<li><strong>rm <em>&lt;filename&gt;</em>:</strong> Removes the specified file from the current directory.</li>\n<li><strong>rpm -ql &#8216;<em>&lt;package name&gt;</em>&#8216;:</strong> Obtains a list of utilities contained within a package.</li>\n<li><strong>sudo chmod <em>&lt;options&gt;</em>:</strong> Changes the access mode for the current directory.</li>\n<li><strong>sudo mkdir <em>&lt;directory name&gt;</em>:</strong> Creates a new directory to hold files.</li>\n<li><strong>sudo reboot:</strong> Reboots the remove AWS system so that you can see the results of any changes you make.</li>\n<li><strong>sudo rmdir <em>&lt;directory name&gt;</em>:</strong> Removes the specified directory.</li>\n<li><strong>sudo yum groupinstall &#8220;<em>&lt;group package name&gt;</em>&#8220;:</strong> Installs the specified group of packages.</li>\n<li><strong>sudo yum search &#8216;<em>&lt;package name&gt;</em>&#8216;:</strong> Searches for a package.</li>\n<li><strong>sudo yum update:</strong> Performs required AWS updates.</li>\n<li><strong>sudo yum -y install <em>&lt;service or feature&gt;</em>:</strong> Installs a required support service or feature onto the AWS system.</li>\n</ul>\n<p>Linux provides the same wealth of CLI commands that Windows does, but these are absolute essentials when working with AWS. You can find many sources for these commands online, but one of the better resources appears at <a href=\"http://www.linuxdevcenter.com/cmd/\" target=\"_blank\" rel=\"noopener\">Linux Command Directory</a>. The important thing is to remember to use the consoles when you can in order to keep things simple.</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2022-04-20T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":230924},{"headers":{"creationTime":"2016-03-27T16:53:26+00:00","modifiedTime":"2022-03-01T17:52:45+00:00","timestamp":"2022-03-01T18:01:07+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Cisco Networking All-in-One For Dummies Cheat Sheet","strippedTitle":"cisco networking all-in-one for dummies cheat sheet","slug":"cisco-networking-all-in-one-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Get acquainted with Cisco network devices and code listings and learn to develop and manage secure Cisco systems.","noIndex":0,"noFollow":0},"content":"To create and configure a Cisco network, you need to know about routers and switches to develop and manage secure Cisco systems. Become acquainted with Cisco network devices and code listings; and find out how to manage static routing and view routing information.","description":"To create and configure a Cisco network, you need to know about routers and switches to develop and manage secure Cisco systems. Become acquainted with Cisco network devices and code listings; and find out how to manage static routing and view routing information.","blurb":"","authors":[{"authorId":9897,"name":"Edward Tetz","slug":"edward-tetz","description":"Edward Tetz, A+, MCSE, MCT, has written several guides to MCSE and other certifications.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/9897"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-621e5f633b85c\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-621e5f633bdc7\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":186978,"title":"OSI Model for Cisco Networking","slug":"osi-model-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186978"}},{"articleId":186968,"title":"How to Configure a Cisco Network","slug":"how-to-configure-a-cisco-network","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186968"}},{"articleId":186977,"title":"Creating a VLAN for Cisco Networking","slug":"creating-a-vlan-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186977"}},{"articleId":186992,"title":"Using EtherChannel for Cisco Networking","slug":"using-etherchannel-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186992"}},{"articleId":186976,"title":"Working with Spanning Tree Protocol for Cisco Networking","slug":"working-with-spanning-tree-protocol-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186976"}},{"articleId":186983,"title":"Managing Static Routing for Cisco Networking","slug":"managing-static-routing-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186983"}},{"articleId":186975,"title":"Viewing Routing Information for Cisco Networking","slug":"viewing-routing-information-for-cisco-networking","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186975"}},{"articleId":186991,"title":"Securing a Cisco Network","slug":"securing-a-cisco-network","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/186991"}}],"content":[{"title":"OSI model for Cisco networking","thumb":null,"image":null,"content":"<p>While you may not use the OSI model every day, you should be familiar with it, specifically when working with Cisco switches and routers (which operate at Layer 2 and Layer 3, respectively). Here are some of the items that operate at each level of the OSI model:</p>\n<table>\n<tbody>\n<tr>\n<th>Layer</th>\n<th>Description</th>\n<th>Examples</th>\n</tr>\n<tr>\n<td>7. Application</td>\n<td>Responsible for initiating or services the request.</td>\n<td>SMTP, DNS, HTTP, and Telnet</td>\n</tr>\n<tr>\n<td>6. Presentation</td>\n<td>Formats the information so that it is understood by the<br />\nreceiving system.</td>\n<td>Compression and encryption depending on the implementation</td>\n</tr>\n<tr>\n<td>5. Session</td>\n<td>Responsible for establishing, managing, and terminating the<br />\nsession.</td>\n<td>NetBIOS</td>\n</tr>\n<tr>\n<td>4. Transport</td>\n<td>Breaks information into segments and is responsible for<br />\nconnection and connectionless communication.</td>\n<td>TCP and UDP</td>\n</tr>\n<tr>\n<td>3. Network</td>\n<td>Responsible for logical addressing and routing</td>\n<td>IP, ICMP, ARP, RIP, IGRP, and routers</td>\n</tr>\n<tr>\n<td>2. Data Link</td>\n<td>Responsible for physical addressing, error correction, and<br />\npreparing the information for the media</td>\n<td>MAC address, CSMA/CD, switches, and bridges</td>\n</tr>\n<tr>\n<td>1. Physical</td>\n<td>Deals with the electrical signal.</td>\n<td>Cables, connectors, hubs, and repeaters</td>\n</tr>\n</tbody>\n</table>\n"},{"title":"How to configure a Cisco network","thumb":null,"image":null,"content":"<p>Like all networks, a Cisco network needs to be properly configured. To do so, you need to know the configuration modes to use when configuring your network. You also should know how to configure an interface, configure a switch management interface, and configure an interface to use DHCP for your Cisco network.</p>\n<h2>Configuration modes for Cisco networking</h2>\n<p>When moving around in the Cisco IOS, you will see many prompts. These prompts change as you move from one configuration mode to another. Here is a summary of the major configuration modes:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>User EXEC mode:</b> When you connect to a Cisco device the default configuration mode is user exec mode. With user exec mode you can view the settings on the device but not make any changes. You know you are in User EXEC mode because the IOS prompt displays a &#8220;&gt;&#8221;.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Privileged EXEC mode:</b> In order to make changes to the device you must navigate to Privileged EXEC mode where you may be required to input a password. Privileged EXEC mode displays with a &#8220;#&#8221; in the prompt.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Global Configuration mode:</b> Global Configuration mode is where you go to make global changes to the router such as the hostname. To navigate to Global Configuration mode from Privileged EXEC mode you type &#8220;configure terminal&#8221; or &#8220;conf t&#8221; where you will be placed at the &#8220;(config)#&#8221; prompt.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Sub Prompts:</b> There are a number of different sub prompts from Global Configuration mode you can navigate to such as the interface prompts to modify settings on a specific interface, or the line prompts to modify the different ports on the device.</p>\n</li>\n</ul>\n<h2>Configure an interface for Cisco networking</h2>\n<p>When working with routers in particular, but also when dealing the management interface on switches, you will often need to configure network interfaces which will either match physical interface ports or virtual interfaces in the form of a virtual LAN (VLAN) interface (when dealing with switches).</p>\n<p>For your router interfaces the following example will set speed, duplex and IP configuration information for the interface FastEthernet 0/0 (notice the interface reference as slot/port). In the case of the router, the interface is enabled using the no shutdown command in the final step; interfaces on switches are enabled by default.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>interface FastEthernet0/0</b>\r\nRouter1(config-if)#<b>description Private LAN</b>\r\nRouter1(config-if)#<b>speed 100</b>\r\nRouter1(config-if)#<b>duplex full</b>\r\nRouter1(config-if)#<b>ip address 192.168.1.1 255.255.255.0</b>\r\nRouter1(config-if)#<b>no shutdown</b></pre>\n<h2>Configure a switch management interface for Cisco networking</h2>\n<p>For your switches, to enable an IP address on your management interface, you will use something similar to this example. In this example, management is being performed over VLAN 1 &#8211; the default VLAN.</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1#<b>interface VLAN 1</b>\r\nSwitch1(config-if)#<b>ip address 192.168.1.241 255.255.255.0</b></pre>\n<h2>Configure an interface to use DHCP for Cisco networking</h2>\n<p>If you want to configure either a router or switch to retrieve its IP configuration information from a network Dynamic Host Configuration Protocol (DHCP) server, then you can commands like the following example.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>interface FastEthernet0/0</b>\r\nRouter1(config-if)#<b>ip dhcp</b></pre>\n"},{"title":"Creating a VLAN for Cisco networking","thumb":null,"image":null,"content":"<p>When working with your Cisco network, you may want to separate users into different broadcast domains for security or traffic reduction. You can do this by implementing VLANs. The following example will create VLAN (VLAN2) and place the ports on a switch (from 1-12) into VLAN2.</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1(config)#<b>interface vlan 2</b>\r\nSwitch1(config-if)#<b>description Finance VLAN</b>\r\nSwitch1(config-if)#<b>exit</b>\r\nSwitch1(config)#<b>interface range FastEthernet 0/1 , FastEthernet 0/12</b>\r\nSwitch1(config-if-range)#<b>switchport mode access</b>\r\nSwitch1(config-if-range)#<b>switchport access vlan 2</b><b>\r\n</b></pre>\n<p>If you are connecting two switches together, then you will want to allow all configured VLANs to pass between the two switches. This is accomplished by implementing a trunk port. To configure port 24 on your switch to be a trunk port, you will use the following code:</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1(config)#<b>interface FastEthernet 0/24</b>\r\nSwitch1(config-if-range)#<b>switchport mode trunk</b></pre>\n"},{"title":"Using EtherChannel for Cisco networking","thumb":null,"image":null,"content":"<p>Don&#8217;t be afraid to use EtherChannel on your Cisco network. EtherChannel allows you to take up to eight network ports on your switch and treat them as a single larger link. This can be used to connect servers with multiple network cards that are bonded (or teamed) to a switch, or to connect multiple switches together. There are two main negotiation protocols, Port Aggregation Protocol (PAgP) which is a proprietary Cisco protocol and Link Aggregation Control Protocol (LACP) which is an open standards protocol.</p>\n<p>To set EtherChannel to use with of the protocols you will configure it to support one of the following modes.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><span class=\"code\">auto</span>: Sets the interface to respond to PAgP negotiation packets, but the interface will start negotiations on its own.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">desireable</span>: Sets the interface to actively attempt to negotiate a PAgP connection.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">on</span>: Forces the connection to bring all links up without using a protocol to negotiate connections. This mode can only connect to another device that is also set to <b>on</b>. When using this mode, the switch does not negotiate the link using either PAgP or LACP.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">active</span>: Sets the interface to actively attempt to negotiate connections with other LACP devices.</p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">passive</span>: Sets the interface to respond to LACP data if it receives negotiation requests from other systems.</p>\n</li>\n</ul>\n<p>The following example will configure EtherChannel to use group ports 11 and 12 on the switch together using PAgP as the protocol. The same type of command would be used on the switch to which Switch1 is connected.</p>\n<pre class=\"code\">Switch1&gt; <b>enable</b>\r\nSwitch1# <b>configure terminal</b> \r\nSwitch1(config)# <b>interface range FastE</b><b>thernet0/1</b><b>1</b><b> -</b><b>1</b><b>2</b> \r\nSwitch1(config-if-range)# <b>switchport mode access</b>\r\nSwitch1(config-if-range)# <b>switchport access vlan 10</b>\r\nSwitch1(config-if-range)# <b>channel-group 5 mode desirable</b></pre>\n"},{"title":"Working with spanning tree protocol for Cisco networking","thumb":null,"image":null,"content":"<p>Spanning Tree Protocol (STP) enables you to create redundant loops on your Cisco network for fault tolerance, and prevents inadvertent loops that may be created on your network from bringing the network to its knees.</p>\n<p>The following code will enable the Cisco proprietary Rapid Per VLAN Spanning Tree Protocol (PVST) over the open standard of Multiple Spanning Tree Protocol (MSTP). In addition to configuring STP on the switch, you will also configure port 2 on the switch for portfast, which allows the port to immediately transition to forwarding mode.</p>\n<pre class=\"code\">Switch1&gt; <b>enable</b>\r\nSwitch1# <b>configure terminal</b> \r\nSwitch1(config)#<b>spanning-tree mode rapid-pvst</b>\r\nSwitch1(config)#<b>interface FastEthernet 0/2</b>\r\nSwitch1(config-if)#<b>spanning-tree portfast</b>\r\n%Warning: portfast should only be enabled on ports connected to a single\r\n host. Connecting hubs, concentrators, switches, bridges, etc... to this\r\n interface when portfast is enabled, can cause temporary bridging loops.\r\n Use with CAUTION\r\n%Portfast will be configured in 10 interfaces due to the range command\r\n but will only have effect when the interfaces are in a non-trunking mode.</pre>\n"},{"title":"Managing static routing for Cisco networking","thumb":null,"image":null,"content":"<p>When working with your routers on your Cisco network, it&#8217;s very likely that you&#8217;ll want to have your routers route data. The first step in having your router pass data from one interface to another interface is to enable routing; just use these commands.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>ip routing</b></pre>\n<p>Whether or not you choose to use a dynamic routing protocol, you may add static routes to your router. The following will add a static route to Router1 to send data to the 192.168.5.0/24 network using the router with the IP address of 192.168.3.2.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>ip routing</b>\r\nRouter1(config)#<b>ip route 192.168.5.0 255.255.255.0 192.168.3.2</b></pre>\n<h2>Managing routing information protocol for Cisco networking</h2>\n<p>Routing Information Protocol (RIP) is widely used, with version 2 allowing you to use Variable Length Subnet Masks (VLSM) across your network. The following code will enable routing, enable RIP, set RIP to version 2, disable route summarization, defines the distributed network from this router as 192.168.5.0/24, and rather than broadcasting routes, it will send RIP data directly to 192.168.1.1.</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nRouter2#<b>configure terminal</b>\r\nRouter2(config)#<b>ip routing</b>\r\nRouter2(config)#<b>router rip</b>\r\nRouter2(config-router)#<b>version 2</b>\r\nRouter2(config-router)#<b>no auto-summary</b>\r\nRouter1(config-router)#<b>network 192.168.5</b><b>.0</b>\r\nRouter2(config-router)#<b>neighbor 192.168.1.1</b></pre>\n<h2>Managing enhanced interior gateway routing protocol for Cisco networking</h2>\n<p>Enhanced Interior Gateway Routing Protocol (EIGRP) is the updated version of IGRP. The following code will enable EIGRP using an autonomous-system (AS) number of 100, distribute two networks and disables auto summary.</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nRouter2#<b>configure terminal</b>\r\nRouter2(config)#<b>ip routing</b>\r\nRouter2(config)#<b>router eigrp 100</b>\r\nRouter2(config-router)#<b>network 192.168.1.0</b>\r\nRouter2(config-router)#<b>network 192.168.5.0</b>\r\nRouter2(config-router)#<b>no auto-summary</b></pre>\n<h2>Managing open shortest path first for Cisco networking</h2>\n<p>Open Shortest Path First (OSPF) is a link state protocol which is widely used. OSPF uses the address of the loopback interface as the OSPF identifier, so this example will set the address of the loopback interface, then enable OSPF with a process ID of 100, and distributing a network of 192.168.255.254 and a network of 192.168. 5.0/24</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nRouter2#<b>configure terminal</b>\r\nRouter2(config)#<b>interface loopback 0</b>\r\nRouter2(config-if)#<b>ip address 192.168.255.254 255.255.255.0</b>\r\nRouter2(config-if)#<b>exit</b>\r\nRouter2(config)#<b>router ospf 100</b>\r\nRouter2(config-router)#<b>network 192.168.255.254 0.0.0.0 area 0</b>\r\nRouter2(config-router)#<b>network 192.168.5.0 0.0.0.255 area 0</b></pre>\n"},{"title":"Viewing routing information for Cisco networking","thumb":null,"image":null,"content":"<p>After setting up any routing protocol that you want to implement &#8211; RIP, OSPF, or EIGRP &#8211; you can view all of your routing information through the <span class=\"code\">ip route</span> command. The following is an example of the output of this command. The output includes a legend showing the codes for each routing protocol, and the specific routes are identified by the source protocol.</p>\n<pre class=\"code\">Router2&gt;<b>enable</b>\r\nPassword:\r\nRouter2#<b>show ip route</b>\r\nCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP\r\n D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area\r\n N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2\r\n E1 - OSPF external type 1, E2 - OSPF external type 2\r\n i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2\r\n ia - IS-IS inter area, * - candidate default, U - per-user static route\r\n o - ODR, P - periodic downloaded static route\r\nGateway of last resort is not set\r\nD 192.168.10.0/24 [90/284160] via 192.168.1.1, 00:04:19, FastEthernet0/0\r\nO 192.168.10.0/24 [110/11] via 192.168.1.1, 00:01:01, FastEthernet0/0\r\nR 192.168.10.0/24 [120/1] via 192.168.1.1, 00:00:07, FastEthernet0/0\r\nC 192.168.5.0/24 is directly connected, FastEthernet0/1\r\nC 192.168.1.0/24 is directly connected, FastEthernet0/0\r\nS 192.168.3.0/24 [1/0] via 192.168.1.1</pre>\n"},{"title":"Securing a Cisco network","thumb":null,"image":null,"content":"<p>Security is always a concern, and your Cisco network needs to be properly secured. In the following sections, you see how to secure your Cisco network by configuring NAT, by configuring an ACL, and by applying that ACL.</p>\n<h2>Securing your Cisco network by configuring NAT</h2>\n<p>The following commands are used to configure NAT overload services on a router called Router1. In this example, a list of source address is created in access list #1, which is then used as the inside source list. The FastEthernet 0/0 port is the overloaded public address port that all inside addresses get translated to.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>access-list 1 permit 10.0.0.0 0.255.255.255</b>\r\nRouter1(config)#<b>ip nat inside source list 1 interface FastEthernet 0/0 overload</b>\r\nRouter1(config)#<b>interface FastEthernet0/0</b>\r\nRouter1(config-if)#<b>ip nat outside</b>\r\nRouter1(config-if)#<b>interface FastEthernet0/1</b>\r\nRouter1(config-if)#<b>ip nat inside</b></pre>\n<h2>Securing your Cisco network by configuring an access control list (ACL)</h2>\n<p>ACLs are used to control traffic flow. They can be used allow or deny the flow of traffic. The two main types of ACLs are:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">Standard ACLs, which have fewer <b>options</b> for classifying data and controlling traffic flow than Extended ACLs. They are only able to manage traffic based on the source IP address. These ACLs are numbered from 1–99 and from 1300–1999.</p>\n</li>\n<li>\n<p class=\"first-para\">Extended ACLs, which offer the ability to filter or control traffic based on a variety of criteria such as source or destination IP addresses, as well as protocol type such as, ICMP, TCP, UDP, or IP. These ACLs are numbered from 100–199 and from 2000–2699.</p>\n</li>\n</ul>\n<p>To create a standard ACL, you can use the following example which will create an ACL that allows traffic for the 192.168.8.0/24 network.</p>\n<pre class=\"code\">Switch1&gt;<b>enable</b>\r\nSwitch1#<b>configure terminal</b>\r\nSwitch1(config)<b>#access-list 50 permit 192.168.8.0 0.0.0.255</b></pre>\n<p>To create an extended ACL you can use the following example which will create an ACL that allows traffic with addresses in the 192.168.8.0/24 network and tcp ports of either 80 (http) or 443 (https):</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>access-list 101 remark This ACL is to control the outbound router traffic.</b>\r\nRouter1(config)#<b>access-list 101 permit tcp 192.168.8.0 0.0.0.255 any eq 80</b>\r\nRouter1(config)<b>#access-list 101 permit tcp 192.168.8.0 0.0.0.255 any eq 443</b></pre>\n<h2>Securing your Cisco network by applying an access control list</h2>\n<p>After you have created an Access Control List (ACL), such as ACL 101 created above, you can apply that ACL to an interface. In the following example, this ACL is placed to restrict outbound traffic on FastEthernet0/1.</p>\n<pre class=\"code\">Router1&gt;<b>enable</b>\r\nRouter1#<b>configure terminal</b>\r\nRouter1(config)#<b>interface F</b><b>astEthernet0/1</b>\r\nRouter1(config-if)#<b>ip access-group 101 out</b></pre>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-03-01T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":208539},{"headers":{"creationTime":"2016-03-27T16:58:40+00:00","modifiedTime":"2022-02-28T19:35:56+00:00","timestamp":"2022-03-01T00:01:06+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"TCP/IP For Dummies Cheat Sheet","strippedTitle":"tcp/ip for dummies cheat sheet","slug":"tcpip-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"To be a master of TCP/IP, become familiar with security terms, general definitions, and Requests For Comment (RFCs).","noIndex":0,"noFollow":0},"content":"As a network administrator, you know that TCP/IP is the glue that holds the Internet and the Web together. As well as being familiar with security terms and general definitions, you need to pay attention to RFCs (Requests for Comment) published by the Internet Engineering Task Force. You can comment on, learn from, and submit RFCs yourself.","description":"As a network administrator, you know that TCP/IP is the glue that holds the Internet and the Web together. As well as being familiar with security terms and general definitions, you need to pay attention to RFCs (Requests for Comment) published by the Internet Engineering Task Force. You can comment on, learn from, and submit RFCs yourself.","blurb":"","authors":[{"authorId":10596,"name":"Candace Leiden","slug":"candace-leiden","description":"Candace Leiden consults on systems and database performance and instructional design for international courseware.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/10596"}},{"authorId":10597,"name":"Marshall Wilensky","slug":"marshall-wilensky","description":"Marshall Wilensky is a retired consultant and network manager for multiprotocol networks.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/10597"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":196388,"title":"TCP/IP Definitions","slug":"tcpip-definitions","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196388"}},{"articleId":196385,"title":"Notable Requests for Comments of Interest to TCP/IP Users","slug":"notable-requests-for-comments-of-interest-to-tcpip-users","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196385"}},{"articleId":196387,"title":"Internet Security Terms and Tips to Use with TCP/IP","slug":"internet-security-terms-and-tips-to-use-with-tcpip","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196387"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281878,"slug":"tcp-ip-for-dummies-6th-edition","isbn":"9780470450604","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/0470450606-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/0470450606/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/tcp-ip-for-dummies-6th-edition-cover-9780470450604-202x255.jpg","width":202,"height":255},"title":"TCP / IP For Dummies, 6th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <b data-author-id=\"10596\">Candace Leiden</b> consults on systems and database performance and instructional design for international courseware. <p><b data-author-id=\"10597\">Marshall Wilensky</b> was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.</p> ","authors":[{"authorId":10596,"name":"Candace Leiden","slug":"candace-leiden","description":"Candace Leiden consults on systems and database performance and instructional design for international courseware.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/10596"}},{"authorId":10597,"name":"Marshall Wilensky","slug":"marshall-wilensky","description":"Marshall Wilensky is a retired consultant and network manager for multiprotocol networks.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/10597"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470450604&quot;]}]\" id=\"du-slot-621d6242d6c64\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470450604&quot;]}]\" id=\"du-slot-621d6242d71e7\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":196388,"title":"TCP/IP Definitions","slug":"tcpip-definitions","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196388"}},{"articleId":196387,"title":"Internet Security Terms and Tips to Use with TCP/IP","slug":"internet-security-terms-and-tips-to-use-with-tcpip","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196387"}},{"articleId":196385,"title":"Notable Requests for Comments of Interest to TCP/IP Users","slug":"notable-requests-for-comments-of-interest-to-tcpip-users","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/196385"}}],"content":[{"title":"TCP/IP definitions","thumb":null,"image":null,"content":"<p>Knowing your way around TCP/IP is key if you want to manage a network successfully. The definitions in the following list explain the basics, such as what an IP address is, and they also clarify the various nets you deal with — extranets, intranet, and subnetting — as well other key terms.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>CIDR (Classless InterDomain Routing):</b> A way to conserve on IP addresses. An IP addressing design that replaces the traditional Class A, B, C structure, CIDR allows one IP address to represent many IP addresses. A CIDR address looks like a regular IP address with a “suffix” on the end, such as 192.200.0.0/12. The suffix is an <i>IP prefix</i>.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>extranet:</b> A private/public hybrid network that uses TCP/IP to share part of an intranet with an outside organization. An extranet is the part of an intranet that outsiders can access over the Internet. Be sure to have good security practices if you have an extranet.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>intranet:</b> An organization’s private network. If your intranet is built on TCP/IP protocols, applications, and services, it’s also an Internet.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>IP address:</b> The 32-bit (IPv4) or 128-bit (IPv6) numeric address for a computer. You must have an IP address to be connected to the Internet. An IP address consists of two parts: the network piece and the host piece. An IPv4 example: 127.0.0.1; an IPv6 example: 0:0:0:0:0:0:0:1 (::1 for short).</p>\n</li>\n<li>\n<p class=\"first-para\"><b>loopback address:</b> IP shorthand for you — actually, your computer. The loopback is a special IP address (127.0.0.1) that isn’t physically connected to any network hardware. You use it to test TCP/IP services and applications without worrying about hardware problems.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Network Address Translation (NAT):</b> Helps the Internet not run out of IP addresses by translating an IP address (perhaps not unique) on one network to another IP address on a different network — usually, the Internet. IPv6 does away with the need for NAT address help, but NAT, unintentionally, also provides firewall security.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>subnetting:</b> Dividing one large Internet into smaller networks (subnets) in which they all share the same network portion of an IP address.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>TCP/IP (Transmission Control Protocol/Internet Protocol):</b> The guts and the rules of the Internet and World Wide Web. A set of protocols, services, and applications for linking computers of all kinds.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Virtual private network (VPN):</b> A private network that runs over the public Internet. You can build a VPN at low cost by using the Internet (rather than your own system of private — and expensive — lines) with special security checks and a tunneling protocol. Companies are beginning to use a private virtual network for both extranets and wide-area intranets.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Voice over Internet Protocol (VoIP):</b> Are you spending too much on phone calls? Get rid of your phone service. You can make phone calls from anywhere to anywhere that has a computer, free VoIP software, and a fast Internet connection. Even better, it’s free. You can call from Buenos Aires to Nairobi for free with VoIP. It doesn’t have to be computer to computer, either. You can also use VoIP to call a regular telephone number.</p>\n</li>\n</ul>\n<p class=\"Tip\">Are you acronym challenged? If you don’t know what a particular acronym means, visit <a href=\"http://whatis.techtarget.com/\" target=\"_blank\" rel=\"noopener\">WhatIs?</a> where you can find thousands of definitions for Internet and security acronyms.</p>\n"},{"title":"Internet security terms and tips to use with TCP/IP","thumb":null,"image":null,"content":"<p>You’re a network administrator, so you know that keeping your Web site secure is an ongoing challenge. You don’t have to know that TCP/IP stands for Transmission Control Protocol/Internet Protocol to use it effectively, but knowing the terms in the following list can make you better able to deal with security issues.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>Advanced Encryption Standard</b>: A secret key cipher used for encryption.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>authentication:</b> Proving you are who you say you are. The simplest form of authentication, an unencrypted username-and-password challenge (“Who are you?” “James Bond.” “Okay, I believe you”), often isn’t reliable enough for the Internet. On the Internet, where hackers and crackers can fake or steal more than your username and password, trust no one. Require authentication for users, computers, and IP addresses to be secure.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>cipher</b>: A means used to encrypt data. A cipher transforms plain text into scrambled cipher text. You can’t decipher the coded cipher text back into plain text without using some kind of key. For example, AES and DES are examples of secret key block ciphers. The complete encryption algorithm is the cipher plus the technique.</p>\n</li>\n<li>\n<p class=\"first-para\"><a href=\"http://www.csrc.nist.gov\" target=\"_blank\" rel=\"noopener\"><b>Computer Security Resource Center</b></a><b>:</b> A Web site that contains security publications, alerts, and news, including documents from the U.S. Department of Defense on security architecture and trusted systems. Located at the U.S. National Institute of Standards and Technology Computer Security Resource Clearinghouse.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>digital certificate:</b> A special, secure file that guarantees your online identity. A digital certificate contains security information, including your name and e-mail address, your encryption key, the name of the Certificate Authority, and the length of the certificate’s validity. (“Who are you?” “James Bond.” “Can you prove your ID?”). A digital certificate is a popular way to perform authentication on the Internet.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>encryption: </b>Scrambling your data by applying a secret code so that no one can read it without using a key.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>IP Security (IPSec):</b> A set of TCP/IP protocols that provide authentication and encryption services, but on a lower layer than TLS.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>public key/private key:</b> A key exchange encryption scheme that uses two keys to encrypt and decrypt data. Anyone can use a public key to encrypt data before it goes across the Internet. Only the receiver has the private key needed to read the data. Pretty Good Privacy (PGP) uses public key/private key encryption methods.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Transport Layer Security (TLS), Secure Socket Layer (SSL):</b> TCP/IP protocols that guarantee privacy on a network by providing authentication and encryption. TLS and its nonstandard companion SSL ensure that your credit card information is safe when you bank or shop. TLS is newer and standard. SSL is still used more.</p>\n</li>\n</ul>\n"},{"title":"Notable requests for comments of interest to TCP/IP users","thumb":null,"image":null,"content":"<p>As a network administrator, you’re familiar with certain things — TCP/IP, security threats, and Requests for Comments, or RFCs. Published by the Internet Engineering Task Force, RFCs offer a chance for professionals to share information, present papers for review, and generally communicate amongst themselves. Some RFCs eventually get adopted as Internet standards.</p>\n<p>The following list contains RFCs that are especially interesting and/or useful:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">RFC 3271, “The Internet is for Everyone,” by V. Cerf</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2664, “FYI on Questions and Answers — Answers to Commonly Asked New Internet User Questions,” by R. Plzak, A. Wells, E. Krol</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2151, “A Primer on Internet and TCP/IP Tools and Utilities,” by G. Kessler, S. Shepard</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2504, “Users&#8217; Security Handbook,” by E. Guttman, L. Leong, G. Malkin</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 1244, “Site Security Handbook” (still useful after many years), by J.P. Holbrook, J.K. Reynolds</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 5485, “Digital Signatures on Internet-Draft Documents”</p>\n</li>\n</ul>\n<p>For laughs, scan these April Fool’s Day RFCs:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">RFC 3251, “Electricity over IP,” by B. Rajagopalan</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 1925, “The Twelve Networking Truths,” R. Callon, Editor</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2100, “The Naming of Hosts” (love the poetry!), by J. Ashworth</p>\n</li>\n<li>\n<p class=\"first-para\">RFC 2549, “IP over Avian Carriers with Quality of Service,” by D. Waitzman</p>\n</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-02-28T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":209488},{"headers":{"creationTime":"2020-06-09T19:08:49+00:00","modifiedTime":"2022-02-23T16:24:13+00:00","timestamp":"2022-02-24T17:07:37+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Cloud Computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"},"slug":"cloud-computing","categoryId":33584}],"title":"Cloud Computing For Dummies Cheat Sheet","strippedTitle":"cloud computing for dummies cheat sheet","slug":"cloud-computing-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Explore how cloud computing has changed the way businesses operate—from leveraging cloud services to transitioning to a DevOps culture.","noIndex":0,"noFollow":0},"content":"Digital transformation is the mantra of many organizations. There is no debate about it: Cloud computing has changed the way businesses operate. Small and mid-sized organizations may be all in on the cloud, while large enterprises are a hybrid and multicloud strategy. The cloud is helping startups challenge industry stalwarts, while at the same time, traditional companies are changing.\r\n\r\n[caption id=\"attachment_271370\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-271370\" src=\"https://www.dummies.com/wp-content/uploads/cloud-computing-concept.jpg\" alt=\"cloud computing\" width=\"556\" height=\"371\" /> ©ESB Professional/Shutterstock.com[/caption]\r\n\r\nThe first phase of cloud adoption was mostly about cutting costs and changing technology spend from a capital expense to an operating expense. For many years, cloud vendors were focused on reducing costs for commodity compute and storage. While reducing costs is still a major driver of cloud adoption, companies are now leveraging cloud services to transform their businesses. The focus of cloud computing has shifted from reducing costs to gaining business agility, providing developers with the tools they demand and ultimately providing excellent customer care.\r\n\r\nIt’s safe to assume that your organization uses some kind of cloud computing, whether it’s a CRM (customer relationship manager) or HR (human recourses) Software as a Service offerings or Cloud native container-based software development services.","description":"Digital transformation is the mantra of many organizations. There is no debate about it: Cloud computing has changed the way businesses operate. Small and mid-sized organizations may be all in on the cloud, while large enterprises are a hybrid and multicloud strategy. The cloud is helping startups challenge industry stalwarts, while at the same time, traditional companies are changing.\r\n\r\n[caption id=\"attachment_271370\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-271370\" src=\"https://www.dummies.com/wp-content/uploads/cloud-computing-concept.jpg\" alt=\"cloud computing\" width=\"556\" height=\"371\" /> ©ESB Professional/Shutterstock.com[/caption]\r\n\r\nThe first phase of cloud adoption was mostly about cutting costs and changing technology spend from a capital expense to an operating expense. For many years, cloud vendors were focused on reducing costs for commodity compute and storage. While reducing costs is still a major driver of cloud adoption, companies are now leveraging cloud services to transform their businesses. The focus of cloud computing has shifted from reducing costs to gaining business agility, providing developers with the tools they demand and ultimately providing excellent customer care.\r\n\r\nIt’s safe to assume that your organization uses some kind of cloud computing, whether it’s a CRM (customer relationship manager) or HR (human recourses) Software as a Service offerings or Cloud native container-based software development services.","blurb":"","authors":[{"authorId":9411,"name":"Judith S. Hurwitz","slug":"judith-hurwitz","description":"Judith Hurwitz is president and CEO of Hurwitz & Associates, specializing in cloud computing, service management, information management, and business strategy.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/9411"}}],"primaryCategoryTaxonomy":{"categoryId":33584,"title":"Cloud Computing","slug":"cloud-computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271400,"title":"Planning Your Cloud Computing Strategy","slug":"planning-your-cloud-computing-strategy","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271400"}},{"articleId":271395,"title":"10 Cloud Do’s and Don’ts","slug":"10-cloud-dos-and-donts","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271395"}},{"articleId":271389,"title":"How SaaS Fits into the Multicloud World","slug":"how-saas-fits-into-the-multicloud-world","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271389"}},{"articleId":271384,"title":"Cloud Computing as the Engine of Adaptive Change","slug":"cloud-computing-as-the-engine-of-adaptive-change","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271384"}},{"articleId":271379,"title":"Cloud Computing Elements: Resource Pools/Cloud Models and Services","slug":"cloud-computing-elements-resource-pools-cloud-models-and-services","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271379"}}],"fromCategory":[{"articleId":271400,"title":"Planning Your Cloud Computing Strategy","slug":"planning-your-cloud-computing-strategy","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271400"}},{"articleId":271395,"title":"10 Cloud Do’s and Don’ts","slug":"10-cloud-dos-and-donts","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271395"}},{"articleId":271389,"title":"How SaaS Fits into the Multicloud World","slug":"how-saas-fits-into-the-multicloud-world","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271389"}},{"articleId":271384,"title":"Cloud Computing as the Engine of Adaptive Change","slug":"cloud-computing-as-the-engine-of-adaptive-change","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271384"}},{"articleId":271379,"title":"Cloud Computing Elements: Resource Pools/Cloud Models and Services","slug":"cloud-computing-elements-resource-pools-cloud-models-and-services","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271379"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281665,"slug":"cloud-computing-for-dummies-2nd-edition","isbn":"9781119546658","categoryList":["technology","information-technology","networking","cloud-computing"],"amazon":{"default":"https://www.amazon.com/gp/product/1119546656/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119546656/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119546656-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119546656/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119546656/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/cloud-computing-for-dummies-2nd-edition-cover-9781119546658-203x255.jpg","width":203,"height":255},"title":"Cloud Computing For Dummies, 2nd Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"9414\">Daniel Kirsch,</b> Managing Director of Hurwitz &amp; Associates, is a thought leader, researcher, author, and consultant in cloud, AI, and security. <b data-author-id=\"9411\">Judith Hurwitz,</b> President of Hurwitz &amp; Associates, is a consultant, thought leader, and coauthor of 10 books including <i>Augmented Intelligence, Cognitive Computing and Big Data Analytics,</i> and <i>Hybrid Cloud for Dummies</i> </p>","authors":[{"authorId":9411,"name":"Judith S. Hurwitz","slug":"judith-hurwitz","description":"Judith Hurwitz is president and CEO of Hurwitz & Associates, specializing in cloud computing, service management, information management, and business strategy.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/9411"}},{"authorId":9414,"name":"Daniel Kirsch","slug":"daniel-kirsch","description":"Daniel Kirsch is a managing director at Hurwitz & Associates, focusing on cloud compliance, governance, security, and privacy.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/9414"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;cloud-computing&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119546658&quot;]}]\" id=\"du-slot-6217bb591e913\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;cloud-computing&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119546658&quot;]}]\" id=\"du-slot-6217bb591f2ef\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/"}}],"content":[{"title":"Leverage the cloud for business transformation","thumb":null,"image":null,"content":"<p>The cloud is the most disruptive computing revolution of our times, fostering dramatic changes in both the technology we live with every day and the way we use technology to transform business practices. As organizations are forced to deal with more innovative competitors, it is imperative that management can implement change fast. Cloud computing has become the engine of adaptive change.</p>\n<p>If your business hasn’t been on top of the technology curve and disrupting your competitors, your competitors are probably disrupting your business. Changes are affecting all businesses very quickly. Taxis have been disrupted by Lyft and Uber. Physical retail stores have been disrupted by Amazon and Wayfair. Many of these upstarts that are challenging industry stalwarts will likely be disrupted by even more agile startups or existing companies that can use their market power to reposition their businesses.</p>\n<p>The cloud makes building connections between your employees, business partners, and customers easier. Innovative companies can no longer live with strict boundaries among business units, subsidiaries, partners, suppliers, and customers. These relationships are key to your company’s success, and building better communications, feedback mechanisms, and transparency will benefit everyone. For example, supply chains benefit when both producers and consumers increase the transparency of their inventories, business plans, and customer needs.</p>\n<p>As IT transforms itself to help guide the cloud strategy, the organization can become an agent of change. With the use of well-defined cloud services supported by standard Application Programming Interfaces (APIs), it is possible to more quickly establish new innovative applications and services to support partners and suppliers. With the use of either public or private cloud services, a business can pilot new services with selected partners and iterate based on feedback. The ability to build quickly, test, change, and execute is the best way to experiment with new business models without requiring a massive capital investment.</p>\n<p>As you move forward with connecting your ecosystem together more tightly, you’ll need to find techniques to manage the myriad data sources that your company and your partners need to manage seamlessly. It’s a complex task that requires careful business and architectural planning. When these application, process, and data services are freed from their traditional constraints, the business benefits will be compelling.</p>\n"},{"title":"The need to support multicloud environments","thumb":null,"image":null,"content":"<p>In a perfect world, an organization would only manage a single unified computing environment. But in the real world, life is complicated. Most businesses have a variety of workloads supported by numerous computing platforms. It is common for one business to support multiple public clouds, several different private cloud services, as well as data center services.</p>\n<p>In some cases, organizations want to leverage multiple public clouds to avoid reliance on a single vendor. In other situations, an organization may need to support specialized services from a particular cloud service. In many organizations, different business units or developers prefer a particular cloud. The theory is that by working with multiple cloud vendors, a customer has the freedom to move if costs increase unexpectedly. The reality is much more complicated. Meanwhile other organizations have allowed teams to select their cloud provider of choice for different projects.</p>\n<p>Almost all public cloud vendors design their services to lock customers into a proprietary platform. Typically, each cloud vendor offers a set of management tools that are only designed to work within that vendor’s cloud ecosystem. While a proprietary management platform solves some problems, it creates new problems down the road.</p>\n"},{"title":"Transitioning to a DevOps culture","thumb":null,"image":null,"content":"<p>The transition from traditional applications development and deployment is based on a change in culture within the business. This cultural change requires that developers and operations management collaborate to create seamlessness between development and deployment — not an easy task. Traditionally, separate teams have to work together. This new era relies on a combination of tools and best practices to accelerate the pace of application creation and enhancement.</p>\n<p>The <a href=\"https://dummies-wp-content.dummies.com/business/operations-management/choosing-the-best-cloud-service-provider-features-and-tools-for-devops/\">DevOps culture</a> provides organizations a variety of benefits that make it a good match for today’s IT environments. The most obvious is greater quality, resulting from the use of Continuous Integration/Continuous Development (CI/CD) concepts that find and correct defects early. <em>Continuous integration</em> focuses on constantly integrating and validating changes to software code and underlying services to ensure errors are identified and fixed as soon as they are introduced. Continuous <em>delivery</em> automates the software delivery process (nonfunctional testing, functional testing, security, deployment, and so on), ensuring that with each change, the application is release ready.</p>\n<p>The use of automation as a mechanism for operating and managing infrastructure and development processes makes managing at scale more effective. Finally, applications can be developed, changed, and delivered much faster, enabling a faster response to competitive conditions and potentially lowering costs.</p>\n"},{"title":"Microservices and containers","thumb":null,"image":null,"content":"<p>The cloud has given rise to a variety of technologies meant to help developers become more productive. Microservices, as an example, can facilitate the development of large, complex applications by breaking them down into a set of loosely coupled services. Each service can be developed by a relatively small team of developers — or even a single developer — allowing for parallel development that can make the process more efficient and development time shorter in addition to simplifying testing.</p>\n<p>The decentralized, modular architecture that characterize many cloud-based implementations have also encouraged the adoption of containers. Containers provide a means of packaging applications such that they are abstracted from their runtime environments. Developers can now spend their time on creating the application and the user experience rather than working on application logic and dependencies. Likewise, IT operations can focus only on how and where the applications is deployed and how it is managed without worrying about version numbers and application-specific configuration issues. Containers build on the virtualization concept by virtualizing at the operating system level, allowing for a container — or many containers — to run directly on top of the operating system kernel.</p>\n<p>Microservices and containers are allowing organizations to quickly update applications to respond to customer and market changes. Some companies release software updates yearly (or quarterly, if they’re ambitious). However, by adopting a DevOps culture supported by microservices and containers, organizations are updating applications weekly or even daily. This ability to continually update applications allows companies to quickly respond to user feedback, add new features without rewriting the entire application, and react to competition.</p>\n"},{"title":"Security and the Rise of DevSecOps","thumb":null,"image":null,"content":"<p>Security is one of the most important considerations when developing a cloud strategy. Historically, the data center provided a secure platform — organizations assumed that anything behind the was secure. However, with a highly distributed software development environment, security now must be considered throughout the entire application life cycle. As more IT organizations change their software development practices to a more agile approach, there is no guarantee security mechanisms will be in place to provide protection for the new generation of applications. Security cannot be an afterthought; instead you must think about the security of your networks and the data being sent to the cloud, the physical and technical security of your cloud vendor, and the security of your virtual cloud instances.</p>\n<p>Despite the continued adoption of DevOps processes, unfortunately security is still often handled traditionally. In many cases, this means that, contrary to the philosophy of a DevOps approach, security is implemented sometime within, or even at the end, of a DevOps process as opposed to being embedded in the development process at the beginning. A solution to this issue is a discipline known as DevSecOps. In brief, DevSecOps is the process of integrating security into the software development process. DevSecOps begins with a change in culture founded in ongoing learning (to raise security awareness with developers who may already be entrenched in DevOps processes), the identification of security-savvy people within the organization who can champion the change in the security approach, and the empowerment of those working on security to determine how best to embed robust security into the clouds they support. Tools can then be used to automate security testing, detect vulnerabilities early, and raise security as a gate to blocking forward progress, and even the deployment of a release, if problems are found.</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2022-02-23T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":271369},{"headers":{"creationTime":"2022-02-03T21:22:52+00:00","modifiedTime":"2022-02-03T21:26:27+00:00","timestamp":"2022-02-24T17:07:29+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","strippedTitle":"windows server 2022 and powershell all-in-one for dummies cheat sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"This Cheat Sheet summarizes the key information related to the installation and operations of a Windows Server 2022 network.","noIndex":0,"noFollow":0},"content":"PowerShell 5.1 is the version of Windows PowerShell that ships with Windows Server 2022, Windows Server 2019, and Windows Server 2016. It’s available for installation on Windows Server 2008 R2 with Service Pack1, Windows Server 2012, and Windows Server 2012 R2. The last three operating systems must have Windows Management Framework 5.1 installed to support PowerShell 5.1.\r\n\r\nYou can upgrade to PowerShell 7.2 fairly easily (the more recent version from Microsoft), though the examples on this Cheat Sheet were only tested in PowerShell 5.1.","description":"PowerShell 5.1 is the version of Windows PowerShell that ships with Windows Server 2022, Windows Server 2019, and Windows Server 2016. It’s available for installation on Windows Server 2008 R2 with Service Pack1, Windows Server 2012, and Windows Server 2012 R2. The last three operating systems must have Windows Management Framework 5.1 installed to support PowerShell 5.1.\r\n\r\nYou can upgrade to PowerShell 7.2 fairly easily (the more recent version from Microsoft), though the examples on this Cheat Sheet were only tested in PowerShell 5.1.","blurb":"","authors":[{"authorId":24327,"name":"Sara Perrott","slug":"sara-perrott","description":"Sara Perrott is an information security professional with a systems and network engineering background. She teaches classes related to Windows Server, Amazon Web Services, networking, and virtualization. Perrott addressed the AWS Imagine conference in 2018 and presented at the RSA conference in 2019. ","_links":{"self":"https://dummies-api.dummies.com/v2/authors/24327"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":290627,"slug":"windows-server-2022-and-powershell-all-in-one-for-dummies","isbn":"9781119867821","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119867827-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119867827/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/9781119867821-203x255.jpg","width":203,"height":255},"title":"Windows Server 2022 and PowerShell All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"\n <p><b data-author-id=\"24327\">Sara Perrott</b> is an information security professional with a systems and network engineering background. She teaches classes related to Windows Server, Amazon Web Services, networking, and virtualization. Perrott addressed the AWS Imagine conference in 2018 and presented at the RSA conference in 2019.</p>","authors":[{"authorId":24327,"name":"Sara Perrott","slug":"sara-perrott","description":"Sara Perrott is an information security professional with a systems and network engineering background. She teaches classes related to Windows Server, Amazon Web Services, networking, and virtualization. Perrott addressed the AWS Imagine conference in 2018 and presented at the RSA conference in 2019. ","_links":{"self":"https://dummies-api.dummies.com/v2/authors/24327"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119867821&quot;]}]\" id=\"du-slot-6217bb51e7400\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119867821&quot;]}]\" id=\"du-slot-6217bb51e7da4\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/"}}],"content":[{"title":"Common administrative tasks","thumb":null,"image":null,"content":"<p>Most system administrators have some commands that they find useful on a daily basis. Here are some you’re sure to need.</p>\n<h3>Setting up for remote management</h3>\n<p>For setting up remote management on systems, there are two commands you need to be aware of.</p>\n<p>To start the WinRM service and create exceptions in the Windows Firewall, run the following:</p>\n<p>winrm quickconfig</p>\n<p>To configure the system to accept remote PowerShell commands via WS-MAN, run the following:</p>\n<p>Enable-PSRemoting</p>\n<h3>Disabling sconfig at startup on Windows Server Core</h3>\n<p>If you’ve worked with Windows Server Core, you’re probably familiar with sconfig, the configuration utility. It’s the first screen you see after you log in to a Windows Server Core system. You may want to disable this menu from coming up after login, and you can do so by typing the following and pressing the Enter key:</p>\n<p>Set-SConfig -AutoLaunch $false</p>\n<p>That’s all there is to it! If you change your mind and you decide you want it to launch again after login, simply type the following and press Enter:</p>\n<p>Set-SConfig -AutoLaunch $true</p>\n<h3>Using environmental variables</h3>\n<p>To view available environmental variables, run the following:</p>\n<p>Set | More</p>\n<p>To add a folder named Tools to a path variable so you can run those tools without having to be in that directory, run the following:</p>\n<p>SET PATH=%PATH%;C:\\Tools</p>\n<p>To view your current path variable settings, type the following:</p>\n<p>echo %PATH%</p>\n<h3>Enabling/disabling the firewall</h3>\n<p>Here’s the command to disable the firewall for all profiles:</p>\n<p>Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False</p>\n<p>To re-enable the firewall for all profiles, use the following:</p>\n<p>Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled True</p>\n"},{"title":"Working with containers","thumb":null,"image":null,"content":"<p>Containers are the new technology trend, especially as the world shift toward microservices. Here are some helpful Docker commands:</p>\n<ul>\n<li><strong>docker login:</strong> Logs you into a DockerHub repository.</li>\n<li><strong>docker pull mcr.microsoft.com/windows/nanoserver:ltsc2022: </strong>Retrieves container images. In this case, it pulls from the mcr.microsoft.com/windows repository and retrieves the nanoserver image with the tag ltsc2022.</li>\n</ul>\n<p class=\"article-tips tip\">The nanoserver container images no longer use the latest tag so you’ll have to specify which container image tag you want. You can look up available tags on the container image’s page on Docker Hub.</p>\n<ul>\n<li><strong>docker ps:</strong> Shows all running containers. To view all containers, including those not running, simply add -a to the end of the command.</li>\n<li><strong>docker build &lt;dockerfile&gt;:</strong> Builds a container from a Dockerfile.</li>\n<li><strong>docker run:</strong> Starts a container utilizing various arguments.</li>\n<li><strong>docker volume create:</strong> Creates a named volume.</li>\n<li><strong>docker container prune:</strong> Removes stopped containers.</li>\n</ul>\n"},{"title":"Troubleshooting with the command prompt","thumb":null,"image":null,"content":"<p>&nbsp;</p>\n<table>\n<thead>\n<tr>\n<td><strong>Name</strong></td>\n<td width=\"91\"><strong>Command</strong></td>\n<td width=\"444\"><strong>Description</strong></td>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>System File Checker</td>\n<td width=\"91\">sfc /scannow</td>\n<td width=\"444\">This utility checks system files to see if they match what’s expected by comparing the signature of the system file on the server with the signature of a cached copy of the same file. The cached files are stored in a compressed folder located at C:\\Windows\\System32\\dllcache. If a corrupt system file is found, it’s replaced.</td>\n</tr>\n<tr>\n<td>Check Disk</td>\n<td width=\"91\">chkdsk /f /r</td>\n<td width=\"444\">This utility repairs file system errors and marks bad sectors so the operating system doesn’t use them anymore. The /f tells the utility to fix any issues it finds, and the /r locates the bad <em>sectors</em> (areas) on the disk. This can take a while. Kick it off, and grab a cup of coffee.</td>\n</tr>\n<tr>\n<td>Driverquery</td>\n<td width=\"91\">driverquery</td>\n<td width=\"444\">This utility queries the system for all the hardware drivers that are installed on Windows. This can be very helpful if you’re running into issues with systems that have similar hardware and you want to know if they have a driver in common.</td>\n</tr>\n<tr>\n<td>BCDEdit</td>\n<td width=\"91\">bcdedit</td>\n<td width=\"444\">Allows you to edit the boot configuration on your Windows server.</td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-02-03T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":290654},{"headers":{"creationTime":"2016-03-26T14:44:49+00:00","modifiedTime":"2021-12-27T21:14:42+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Network Administration: Granting Share Permissions","strippedTitle":"network administration: granting share permissions","slug":"network-administration-granting-share-permissions","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"When you first create a file share on your network, all users are granted read-only access to the share. If you want to allow users to modify files in the share or allow them to create new files, you need to add permissions. Here’s how to do this using Windows Explorer:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Open Windows Explorer by pressing the Windows key and clicking Computer; then browse to the folder whose permissions you want to manage.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Right-click the folder you want to manage and then choose Properties from the contextual menu.</p>\r\n<p class=\"child-para\">The Properties dialog box for the folder appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Sharing tab; then click Advanced Sharing.</p>\r\n<p class=\"child-para\">The Advanced Sharing dialog box appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click Permissions.</p>\r\n<p class=\"child-para\">The dialog box shown appears. This dialog box lists all the users and groups to whom you’ve granted permission for the folder. Initially, read permissions are granted to a group called Everyone, which means that anyone can view files in the share but no one can create, modify, or delete files in the share.</p>\r\n<p class=\"child-para\">When you select a user or group from the list, the check boxes at the bottom of the list change to indicate which specific permissions you’ve assigned to each user or group.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380583.image0.jpg\" alt=\"image0.jpg\" width=\"330\" height=\"400\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Add button.</p>\r\n<p class=\"child-para\">The dialog box shown appears.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380584.image1.jpg\" alt=\"image1.jpg\" width=\"535\" height=\"293\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Enter the name of the user or group to whom you want to grant permission and then click OK.</p>\r\n<p class=\"child-para\">If you’re not sure of the name, click the Advanced button. This action brings up a dialog box from which you can search for existing users.</p>\r\n<p class=\"child-para\">When you click OK, you return to the Share Permissions tab, with the new user or group added.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Select the appropriate Allow and Deny check boxes to specify which permissions to allow for the user or group.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Repeat Steps 5–7 for any other permissions that you want to add.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">When you’re done, click OK.</p>\r\n</li>\r\n</ol>\r\nHere are a few other thoughts to ponder concerning adding permissions:\r\n\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">If you want to grant full access to everyone for this folder, don’t bother adding another permission. Instead, select the Everyone group and then select the Allow check box for each permission type.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">You can remove a permission by selecting the permission and then clicking the Remove button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">If you’d rather not fuss with the Share and Storage Management console, you can set the permissions from My Computer. Right-click the shared folder, choose Sharing and Security from the contextual menu, and then click Permissions. Then you can follow the preceding procedure, picking up at Step 5.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is most restrictive always applies. If the share permissions grant a user Full Control permission but the folder permission grants the user only Read permission, for example, the user has only Read permission for the folder.</p>\r\n</li>\r\n</ul>","description":"When you first create a file share on your network, all users are granted read-only access to the share. If you want to allow users to modify files in the share or allow them to create new files, you need to add permissions. Here’s how to do this using Windows Explorer:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Open Windows Explorer by pressing the Windows key and clicking Computer; then browse to the folder whose permissions you want to manage.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Right-click the folder you want to manage and then choose Properties from the contextual menu.</p>\r\n<p class=\"child-para\">The Properties dialog box for the folder appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Sharing tab; then click Advanced Sharing.</p>\r\n<p class=\"child-para\">The Advanced Sharing dialog box appears.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click Permissions.</p>\r\n<p class=\"child-para\">The dialog box shown appears. This dialog box lists all the users and groups to whom you’ve granted permission for the folder. Initially, read permissions are granted to a group called Everyone, which means that anyone can view files in the share but no one can create, modify, or delete files in the share.</p>\r\n<p class=\"child-para\">When you select a user or group from the list, the check boxes at the bottom of the list change to indicate which specific permissions you’ve assigned to each user or group.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380583.image0.jpg\" alt=\"image0.jpg\" width=\"330\" height=\"400\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Add button.</p>\r\n<p class=\"child-para\">The dialog box shown appears.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/380584.image1.jpg\" alt=\"image1.jpg\" width=\"535\" height=\"293\" /></li>\r\n \t<li>\r\n<p class=\"first-para\">Enter the name of the user or group to whom you want to grant permission and then click OK.</p>\r\n<p class=\"child-para\">If you’re not sure of the name, click the Advanced button. This action brings up a dialog box from which you can search for existing users.</p>\r\n<p class=\"child-para\">When you click OK, you return to the Share Permissions tab, with the new user or group added.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Select the appropriate Allow and Deny check boxes to specify which permissions to allow for the user or group.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Repeat Steps 5–7 for any other permissions that you want to add.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">When you’re done, click OK.</p>\r\n</li>\r\n</ol>\r\nHere are a few other thoughts to ponder concerning adding permissions:\r\n\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">If you want to grant full access to everyone for this folder, don’t bother adding another permission. Instead, select the Everyone group and then select the Allow check box for each permission type.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">You can remove a permission by selecting the permission and then clicking the Remove button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">If you’d rather not fuss with the Share and Storage Management console, you can set the permissions from My Computer. Right-click the shared folder, choose Sharing and Security from the contextual menu, and then click Permissions. Then you can follow the preceding procedure, picking up at Step 5.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is most restrictive always applies. If the share permissions grant a user Full Control permission but the folder permission grants the user only Read permission, for example, the user has only Read permission for the folder.</p>\r\n</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4864c09\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4865589\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":164953},{"headers":{"creationTime":"2016-08-17T12:34:25+00:00","modifiedTime":"2021-12-27T18:59:16+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Using Workgroup Templates Across Your Network","strippedTitle":"using workgroup templates across your network","slug":"using-workgroup-templates-across-network","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"Although an occasional sacrifice to the Office gods may make your networking life a bit easier, a template isn’t a place of worship. Rather, a <em>template</em> is a special type of document file that holds formatting information, boilerplate text, and other customized settings that you can use as the basis for new documents.\r\n\r\nThree Office programs — Word, Excel, and PowerPoint — enable you to specify a template whenever you create a new document. When you create a new document in Word, Excel, or PowerPoint by choosing File → New, you see a dialog box that lets you choose a template for the new document.\r\n\r\nOffice comes with a set of templates for the most common types of documents. These templates are grouped under the various tabs that appear across the top of the New dialog box.\r\n\r\nIn addition to the templates that come with Office, you can create your own templates in Word, Excel, and PowerPoint. Creating your own templates is especially useful if you want to establish a consistent look for documents prepared by your network users. For example, you can create a Letter template that includes your company’s letterhead or a Proposal template that includes a company logo.\r\n\r\nOffice enables you to store templates in two locations. Where you put them depends on what you want to do with them:\r\n<ul>\r\n \t<li><strong>The User Templates folder on each user’s local disk drive:</strong> If a particular user needs a specialized template, put it here.</li>\r\n \t<li><strong>The Workgroup Templates folder on a shared network drive:</strong> If you have templates that you want to make available to all network users on the network server, put them here. This arrangement still allows each user to create templates that aren’t available to other network users.</li>\r\n</ul>\r\nWhen you use both a User Templates folder and a Workgroup Templates folder, Office combines the templates from both folders and lists them in alphabetical order in the New dialog box. For example, the User Templates folder may contain templates named Blank Document and web Page, and the Workgroup Templates folder may contain a template named Company Letterhead. In this case, three templates appear in the New dialog box, in this order: Blank Document, Company Letterhead, and web Page.\r\n\r\nTo set the location of the User Templates and Workgroup Templates folders, follow these steps in Microsoft Word:\r\n<ol>\r\n \t<li>In Word, create a new document or open an existing document. It doesn't matter which document you use. This step is required simply because word doesn't let you access the template folder locations unless a document is open.</li>\r\n \t<li>Choose File, and then Options. The Word Options dialog box opens.</li>\r\n \t<li>Click the Advanced tab. The Advanced options appear.</li>\r\n \t<li>Scroll down to the General section and then click the File Locations button. The File Locations dialog box appears.\r\n\r\n[caption id=\"attachment_222302\" align=\"aligncenter\" width=\"535\"]<a href=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\"><img class=\"wp-image-222302 size-full\" src=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\" alt=\"file locations\" width=\"535\" height=\"403\" /></a> Setting the file locations.[/caption]</li>\r\n \t<li class=\"NumListItem\">Double-click the Workgroup Templates item. This step opens a dialog box that lets you browse to the location of your template files.</li>\r\n \t<li class=\"NumListItem\">Browse to the template files and then click OK. You return to the File Locations dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK to dismiss the File Locations dialog box. You return to the Word Options dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK again. The Word Options dialog box is dismissed.</li>\r\n</ol>\r\n<p class=\"article-tips tip\">Although the User Templates and Workgroup Templates settings affect Word, Excel, and PowerPoint, you can change these settings only from Word. The Options dialog boxes in Excel and PowerPoint don’t show the User Templates or Workgroup Templates options.</p>\r\nWhen you install Office, the standard templates that come with Office are copied into a folder on the computer’s local disk drive, and the User Templates option is set to this folder. The Workgroup Templates option is left blank. You can set the Workgroup Templates folder to a shared network folder by clicking Network Templates, clicking the Modify button, and specifying a shared network folder that contains your workgroup templates.","description":"Although an occasional sacrifice to the Office gods may make your networking life a bit easier, a template isn’t a place of worship. Rather, a <em>template</em> is a special type of document file that holds formatting information, boilerplate text, and other customized settings that you can use as the basis for new documents.\r\n\r\nThree Office programs — Word, Excel, and PowerPoint — enable you to specify a template whenever you create a new document. When you create a new document in Word, Excel, or PowerPoint by choosing File → New, you see a dialog box that lets you choose a template for the new document.\r\n\r\nOffice comes with a set of templates for the most common types of documents. These templates are grouped under the various tabs that appear across the top of the New dialog box.\r\n\r\nIn addition to the templates that come with Office, you can create your own templates in Word, Excel, and PowerPoint. Creating your own templates is especially useful if you want to establish a consistent look for documents prepared by your network users. For example, you can create a Letter template that includes your company’s letterhead or a Proposal template that includes a company logo.\r\n\r\nOffice enables you to store templates in two locations. Where you put them depends on what you want to do with them:\r\n<ul>\r\n \t<li><strong>The User Templates folder on each user’s local disk drive:</strong> If a particular user needs a specialized template, put it here.</li>\r\n \t<li><strong>The Workgroup Templates folder on a shared network drive:</strong> If you have templates that you want to make available to all network users on the network server, put them here. This arrangement still allows each user to create templates that aren’t available to other network users.</li>\r\n</ul>\r\nWhen you use both a User Templates folder and a Workgroup Templates folder, Office combines the templates from both folders and lists them in alphabetical order in the New dialog box. For example, the User Templates folder may contain templates named Blank Document and web Page, and the Workgroup Templates folder may contain a template named Company Letterhead. In this case, three templates appear in the New dialog box, in this order: Blank Document, Company Letterhead, and web Page.\r\n\r\nTo set the location of the User Templates and Workgroup Templates folders, follow these steps in Microsoft Word:\r\n<ol>\r\n \t<li>In Word, create a new document or open an existing document. It doesn't matter which document you use. This step is required simply because word doesn't let you access the template folder locations unless a document is open.</li>\r\n \t<li>Choose File, and then Options. The Word Options dialog box opens.</li>\r\n \t<li>Click the Advanced tab. The Advanced options appear.</li>\r\n \t<li>Scroll down to the General section and then click the File Locations button. The File Locations dialog box appears.\r\n\r\n[caption id=\"attachment_222302\" align=\"aligncenter\" width=\"535\"]<a href=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\"><img class=\"wp-image-222302 size-full\" src=\"https://www.dummies.com/wp-content/uploads/file-locations.jpg\" alt=\"file locations\" width=\"535\" height=\"403\" /></a> Setting the file locations.[/caption]</li>\r\n \t<li class=\"NumListItem\">Double-click the Workgroup Templates item. This step opens a dialog box that lets you browse to the location of your template files.</li>\r\n \t<li class=\"NumListItem\">Browse to the template files and then click OK. You return to the File Locations dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK to dismiss the File Locations dialog box. You return to the Word Options dialog box.</li>\r\n \t<li class=\"NumListItem\">Click OK again. The Word Options dialog box is dismissed.</li>\r\n</ol>\r\n<p class=\"article-tips tip\">Although the User Templates and Workgroup Templates settings affect Word, Excel, and PowerPoint, you can change these settings only from Word. The Options dialog boxes in Excel and PowerPoint don’t show the User Templates or Workgroup Templates options.</p>\r\nWhen you install Office, the standard templates that come with Office are copied into a folder on the computer’s local disk drive, and the User Templates option is set to this folder. The Workgroup Templates option is left blank. You can set the Workgroup Templates folder to a shared network folder by clicking Network Templates, clicking the Modify button, and specifying a shared network folder that contains your workgroup templates.","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}},{"articleId":184875,"title":"The Many Types of Firewalls on a Network","slug":"the-many-types-of-firewalls-on-a-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/184875"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb48437e5\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4844166\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-11-17T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":222301},{"headers":{"creationTime":"2016-08-18T14:35:48+00:00","modifiedTime":"2021-12-27T18:58:27+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Network Administration: How to Create a New User in Active Directory","strippedTitle":"network administration: how to create a new user in active directory","slug":"network-administration-create-new-user-windows-server-2016","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"User accounts are among the basic tools for managing a Windows server. As a network administrator, you’ll spend a large percentage of your time dealing with user accounts To create a new domain user account in Active Directory, follow these steps:","description":"User accounts are among the basic tools for managing a Windows server. As a network administrator, you’ll spend a large percentage of your time dealing with user accounts To create a new domain user account in Active Directory, follow these steps:","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}},{"articleId":184875,"title":"The Many Types of Firewalls on a Network","slug":"the-many-types-of-firewalls-on-a-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/184875"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb483797a\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4838353\"></div></div>"},"articleType":{"articleType":"Step by Step","articleList":null,"content":[{"title":"Choose Start→ Windows Administrative Tools → Active Directory Users and Computers.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Active-Directory-Users-.jpg","width":220,"height":153},"image":{"src":"https://www.dummies.com/wp-content/uploads/Active-Directory-Users.jpg","width":629,"height":440},"content":"<p>This command fires up the Active Directory Users and Computers management console.</p>\n"},{"title":"Right-click the Users Organizational Unit for the domain that you want to add the user to and then choose New →User from the contextual menu.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/new-user.jpg","width":220,"height":187},"image":{"src":"https://www.dummies.com/wp-content/uploads/new-user.jpg","width":535,"height":456},"content":"<p>This command summons the New Object – User Wizard.</p>\n"},{"title":"Enter the user’s first name, middle initial, and last name.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>As you fill in these fields, the New Object Wizard automatically fills in the Full Name field.</p>\n"},{"title":"Change the Full Name field if you want it to appear different from what the wizard proposes.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>You may want to reverse the first and last names so the last name appears first, for example.</p>\n"},{"title":"Enter the user logon name.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>This name must be unique within the domain. (Don’t worry, if you try to use a name that isn’t unique, you’ll get an error message.)</p>\n<p>Pick a naming scheme to follow when creating user logon names. You can use the first letter of the first name followed by the complete last name, the complete first name followed by the first letter of the last name, or any other scheme that suits your fancy.</p>\n"},{"title":"Click Next.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/user’s-password.jpg","width":220,"height":187},"image":{"src":"https://www.dummies.com/wp-content/uploads/user’s-password.jpg","width":535,"height":456},"content":"<p>The second page of the New Object – User Wizard appears.</p>\n"},{"title":"Enter the password twice.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>You’re asked to enter the password and then confirm it, so type it correctly. If you don’t enter it identically in both boxes, you’re asked to correct your mistake.</p>\n"},{"title":"Specify the password options that you want to apply.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>The following password options are available:</p>\n<ul>\n<li>User Must Change Password at Next Logon</li>\n<li>User Cannot Change Password</li>\n<li>Password Never Expires</li>\n<li>Account Is Disabled</li>\n</ul>\n"},{"title":"Click Next.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>You’re taken to the final page of the New Object – User Wizard.</p>\n"},{"title":"Verify that the information is correct and then click Finish to create the account.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/user-account-information.jpg","width":220,"height":187},"image":{"src":"https://www.dummies.com/wp-content/uploads/user-account-information.jpg","width":535,"height":456},"content":"<p>If the account information isn’t correct, click the Back button, and correct the error.</p>\n<p>You’re done! Now you can customize the user’s account settings. At minimum, you’ll probably want to add the user to one or more groups. You may also want to add contact information for the user or set up other account options.</p>\n<p>An alternative way to create a new user is simply to copy an existing user. When you copy an existing user, you provide a new username and password and Windows copies all the other property settings from the existing user to the new user.</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":222508},{"headers":{"creationTime":"2016-03-26T15:27:52+00:00","modifiedTime":"2021-12-27T18:52:29+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"How to Manage a Network Server Remotely","strippedTitle":"how to manage a network server remotely","slug":"how-to-manage-a-network-server-remotely","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"One of the most useful tools available to system administrators is a program called <i>Remote Desktop Connection</i>. Remote Desktop Connection lets you connect to a server computer from your own computer's desktop and use it as though you were actually sitting at the server. The program enables you to manage your servers from the comfort of your own office, without having to walk down to the server room.\r\n<p class=\"Tip\">Remote Desktop Connection is especially important if you're using virtual servers. Because virtual servers have no real hardware, including keyboards, mice, or monitors, Remote Desktop Connection is the primary way you interact with them.</p>\r\nBefore you can use Remote Desktop Connection to access a server, you must enable remote access on the server. You can do that from the System Properties dialog box. Here are the steps:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Open the Control Panel.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Double-click System.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Remote Settings link.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Remote Tab.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Select the Allow Remote Connections to This Computer radio button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click OK.</p>\r\n<img class=\"alignnone size-full wp-image-290026\" src=\"https://www.dummies.com/wp-content/uploads/System-properties.jpg\" alt=\"Windows remote desktop window\" width=\"410\" height=\"466\" /></li>\r\n</ol>\r\nAll versions of Windows come with a program called the <i>Remote Desktop Client, </i>which you can use to connect to a server remotely. Here are the steps for Windows 7:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Click the Start button, type the word Remote, and then click the Remote Desktop Connection icon.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Enter the name of the server you want to connect to.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Connect button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Log on and use the server.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/366885.image1.png\" alt=\"image1.png\" width=\"421\" height=\"259\" /></li>\r\n</ol>","description":"One of the most useful tools available to system administrators is a program called <i>Remote Desktop Connection</i>. Remote Desktop Connection lets you connect to a server computer from your own computer's desktop and use it as though you were actually sitting at the server. The program enables you to manage your servers from the comfort of your own office, without having to walk down to the server room.\r\n<p class=\"Tip\">Remote Desktop Connection is especially important if you're using virtual servers. Because virtual servers have no real hardware, including keyboards, mice, or monitors, Remote Desktop Connection is the primary way you interact with them.</p>\r\nBefore you can use Remote Desktop Connection to access a server, you must enable remote access on the server. You can do that from the System Properties dialog box. Here are the steps:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Open the Control Panel.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Double-click System.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Remote Settings link.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Remote Tab.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Select the Allow Remote Connections to This Computer radio button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click OK.</p>\r\n<img class=\"alignnone size-full wp-image-290026\" src=\"https://www.dummies.com/wp-content/uploads/System-properties.jpg\" alt=\"Windows remote desktop window\" width=\"410\" height=\"466\" /></li>\r\n</ol>\r\nAll versions of Windows come with a program called the <i>Remote Desktop Client, </i>which you can use to connect to a server remotely. Here are the steps for Windows 7:\r\n<ol class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Click the Start button, type the word Remote, and then click the Remote Desktop Connection icon.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Enter the name of the server you want to connect to.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Click the Connect button.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Log on and use the server.</p>\r\n<img src=\"https://www.dummies.com/wp-content/uploads/366885.image1.png\" alt=\"image1.png\" width=\"421\" height=\"259\" /></li>\r\n</ol>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":208013,"title":"Networking For Dummies Cheat Sheet","slug":"networking-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208013"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb482fa31\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4830417\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":168520},{"headers":{"creationTime":"2016-03-27T16:49:39+00:00","modifiedTime":"2021-12-27T18:39:23+00:00","timestamp":"2022-02-24T17:07:20+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General (Networking)","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Networking For Dummies Cheat Sheet","strippedTitle":"networking for dummies cheat sheet","slug":"networking-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Get to know some networking basics such as pin connections and IP address ranges — and become familiar with useful websites for networking information.","noIndex":0,"noFollow":0},"content":"Managing a small computer network is well within your reach, but it's vital to track key information that's unique to your network. Begin by recording your network and Internet connection information in one place, making it easy to find and readily available when you need it. Then, get to know some of the basic networking concepts such as pin connections and IP address ranges — and become familiar with useful websites for networking information.\r\n\r\n[caption id=\"attachment_269748\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-269748\" src=\"https://www.dummies.com/wp-content/uploads/networking-concept.jpg\" alt=\"network illustration\" width=\"556\" height=\"371\" /> ©hywards/Shutterstock.com[/caption]","description":"Managing a small computer network is well within your reach, but it's vital to track key information that's unique to your network. Begin by recording your network and Internet connection information in one place, making it easy to find and readily available when you need it. Then, get to know some of the basic networking concepts such as pin connections and IP address ranges — and become familiar with useful websites for networking information.\r\n\r\n[caption id=\"attachment_269748\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-269748\" src=\"https://www.dummies.com/wp-content/uploads/networking-concept.jpg\" alt=\"network illustration\" width=\"556\" height=\"371\" /> ©hywards/Shutterstock.com[/caption]","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General (Networking)","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":222301,"title":"Using Workgroup Templates Across Your Network","slug":"using-workgroup-templates-across-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222301"}},{"articleId":185261,"title":"Network Planning: Dedicated Servers and Server Types","slug":"network-planning-dedicated-servers-and-server-types","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/185261"}},{"articleId":184875,"title":"The Many Types of Firewalls on a Network","slug":"the-many-types-of-firewalls-on-a-network","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/184875"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}},{"articleId":222448,"title":"Network Administration: How to Set Mailbox Storage Limits in Microsoft Exchange Server 2016","slug":"network-administration-set-mailbox-storage-limits-microsoft-exchange-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222448"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281781,"slug":"networking-for-dummies-12th-edition","isbn":"9781119648505","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119648505-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119648505/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-for-dummies-12th-edition-cover-9781119648505-203x255.jpg","width":203,"height":255},"title":"Networking For Dummies, 12th Edition","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"\n <p><b data-author-id=\"8946\">Doug Lowe</b> is the bestselling author of <i>Networking For Dummies</i> and <i>Networking All-in-One Desk Reference For Dummies</i>. His 50+ books include more than 30 in the <i>For Dummies</i> series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. </p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":"Doug Lowe still has the electronics experimenter's kit his dad gave him when he was 10. He became an IT director, programmer, and author of books on various programming languages, Microsoft Office, web programming, and PCs. But Lowe never forgot his first love: electronics.","_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb4823a03\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119648505&quot;]}]\" id=\"du-slot-6217bb48243c4\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":168547,"title":"Tracking Key Network Information","slug":"tracking-key-network-information","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/168547"}},{"articleId":168548,"title":"Tracking Key Internet Connection Information","slug":"tracking-key-internet-connection-information","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/168548"}},{"articleId":168525,"title":"RJ-45 Pin Connections for Your TCP/IP Network","slug":"rj-45-pin-connections-for-your-tcpip-network","categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/168525"}},{"articleId":168546,"title":"Private IP Address Ranges for Networks","slug":"private-ip-address-ranges-for-networks","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/168546"}},{"articleId":168555,"title":"Useful Websites for Networking Information","slug":"useful-websites-for-networking-information","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/168555"}}],"content":[{"title":"Tracking Key Network Information","thumb":null,"image":null,"content":"<p>Fill in these tables to keep track of the key information that allows you to access your network, contact your network administrator, access network storage, use network printers, and oversee important network servers.</p>\n<table>\n<caption><strong>Account Information</strong></caption>\n<tbody>\n<tr>\n<td><i>My user ID</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n<tr>\n<td><i>My password</i></td>\n<td>Don&#8217;t write it here! (Memorize it or keep it in a safe place,<br />\nseparate from associated information.)</td>\n</tr>\n<tr>\n<td><i>Domain name</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n<tr>\n<td><i>My e-mail address</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>My Network Administrator</strong></caption>\n<tbody>\n<tr>\n<td><i>Name</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n<tr>\n<td><i>Phone number</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n<tr>\n<td><i>E-mail name</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n<tr>\n<td><i>Favorite snack food</i></td>\n<td><i>__________________________________</i></td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>My Network Drives</strong></caption>\n<tbody>\n<tr>\n<th>Drive Letter</th>\n<th>Description</th>\n</tr>\n<tr>\n<td><i>___</i></td>\n<td>__________________________________________________________________</td>\n</tr>\n<tr>\n<td><i>___</i></td>\n<td>__________________________________________________________________</td>\n</tr>\n<tr>\n<td><i>___</i></td>\n<td>__________________________________________________________________</td>\n</tr>\n<tr>\n<td><i>___</i></td>\n<td>__________________________________________________________________</td>\n</tr>\n<tr>\n<td><i>___</i></td>\n<td><i>__________________________________________________________________</i></td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>My Network Printers</strong></caption>\n<tbody>\n<tr>\n<th>Printer Name</th>\n<th>IP Address</th>\n<th>Description</th>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td>________________________________________________</td>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td>________________________________________________</td>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td>________________________________________________</td>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td>________________________________________________</td>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td>________________________________________________</td>\n</tr>\n<tr>\n<td><i>_________</i></td>\n<td><i>________</i></td>\n<td><i>________________________________________________</i></td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>My Network Servers</strong></caption>\n<tbody>\n<tr>\n<th>Server Name</th>\n<th>IP Address</th>\n<th>Description</th>\n</tr>\n<tr>\n<td><i>____________</i></td>\n<td><i>________</i></td>\n<td>_____________________________________________</td>\n</tr>\n<tr>\n<td><i>____________</i></td>\n<td><i>________</i></td>\n<td>_____________________________________________</td>\n</tr>\n<tr>\n<td><i>____________</i></td>\n<td><i>________</i></td>\n<td>_____________________________________________</td>\n</tr>\n<tr>\n<td><i>____________</i></td>\n<td><i>________</i></td>\n<td><i>_____________________________________________</i></td>\n</tr>\n</tbody>\n</table>\n"},{"title":"Tracking Key Internet Connection Information","thumb":null,"image":null,"content":"<p>Use these spaces to keep track of key information about your Internet connection, including your Internet service provider, your TCP/IP configuration, and information about your router.</p>\n<table>\n<caption><strong>Provider</strong></caption>\n<tbody>\n<tr>\n<td>Company name</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Technical-support contact</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Technical-support phone number</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Website</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>E-mail address</td>\n<td>____________________________________</td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>TCP/IP Information</strong></caption>\n<tbody>\n<tr>\n<td>IP range</td>\n<td>________________ to ________________</td>\n</tr>\n<tr>\n<td>Subnet mask</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Default gateway</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Nameservers</td>\n<td>__________ — __________ — __________</td>\n</tr>\n</tbody>\n</table>\n<table>\n<caption><strong>Router Information</strong></caption>\n<tbody>\n<tr>\n<td>Make and model</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Internal IP address (LAN)</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>External IP address (WAN)</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Administrator username</td>\n<td>____________________________________</td>\n</tr>\n<tr>\n<td>Password</td>\n<td><i>Don&#8217;t write it here!</i> <i></i><i>(Memorize it or keep it<br />\nin a safe place, separate from associated information.)</i></td>\n</tr>\n</tbody>\n</table>\n"},{"title":"RJ-45 Pin Connections for Your TCP/IP Network","thumb":null,"image":null,"content":"<p>If you&#8217;re wiring up your own RJ-45 connectors for a TCP/IP network, you need this information to make sure you connect the pins correctly. Colors make identification easy:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>Pin 1:</b> White/orange</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Pin 2:</b> Orange</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Pin 3:</b> White/green</p>\n</li>\n<li>\n<p class=\"first-para\"><b>Pin 6:</b> Green</p>\n</li>\n</ul>\n"},{"title":"Private IP Address Ranges for Networks","thumb":null,"image":null,"content":"<p>Private IP (Internet protocol) address blocks are the IP addresses most often used for private networks. Most networks use addresses in one of these ranges:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><span class=\"code\">10.0.0.0</span> to <span class=\"code\">10.255.255.255</span></p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">172.16.0.0</span> to <span class=\"code\">172.31.255.255</span></p>\n</li>\n<li>\n<p class=\"first-para\"><span class=\"code\">192.168.0.0</span> to <span class=\"code\">192.168.255.255</span></p>\n</li>\n</ul>\n"},{"title":"Useful Websites for Networking Information","thumb":null,"image":null,"content":"<p>As a network administrator, the Internet is your best friend for networking resources, solutions, news, and guidance. Here are some websites for you to visit often.</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>To register domains:</b></p>\n<p class=\"child-para\"><a href=\"http://www.internic.net/\" target=\"_blank\" rel=\"noopener\">InterNIC</a><u></u></p>\n<p class=\"child-para\"><a href=\"http://www.networksolutions.com/\" target=\"_blank\" rel=\"noopener\">Network Solutions</a></p>\n<p class=\"child-para\"><a href=\"http://www.register.com\" target=\"_blank\" rel=\"noopener\">register.com</a></p>\n</li>\n<li>\n<p class=\"first-para\"><b>To check your TCP/IP configuration: </b><a href=\"https://www.dnsstuff.com/freetools\" target=\"_blank\" rel=\"noopener\">DNSstuff</a></p>\n</li>\n<li>\n<p class=\"first-para\"><b>To see if your e-mail server has been blacklisted: </b><a href=\"http://www.dnsbl.info\" target=\"_blank\" rel=\"noopener\">DNSBL.info</a></p>\n</li>\n<li>\n<p class=\"first-para\"><b>To stay current in the industry, try these standards organizations:</b></p>\n<p class=\"child-para\"><a href=\"http://www.ieee.org\" target=\"_blank\" rel=\"noopener\">Institute of Electrical and Electronics Engineers</a></p>\n<p class=\"child-para\"><a href=\"http://www.iso.org\" target=\"_blank\" rel=\"noopener\">International Organization for Standardization</a></p>\n<p class=\"child-para\"><a href=\"http://www.ietf.org\" target=\"_blank\" rel=\"noopener\">Internet Engineering Task Force</a></p>\n<p class=\"child-para\"><a href=\"http://www.isoc.org\" target=\"_blank\" rel=\"noopener\">Internet Society</a></p>\n</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2021-12-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":208013}],"_links":{"self":{"self":"https://dummies-api.dummies.com/v2/categories/33581/categoryArticles?sortField=time&sortOrder=1&size=10&offset=0"},"next":{"self":"https://dummies-api.dummies.com/v2/categories/33581/categoryArticles?sortField=time&sortOrder=1&size=10&offset=10"},"last":{"self":"https://dummies-api.dummies.com/v2/categories/33581/categoryArticles?sortField=time&sortOrder=1&size=10&offset=250"}}},"objectTitle":"","status":"success","pageType":"article-category","objectId":"33581","page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{"categoriesFilter":[{"itemId":0,"itemName":"All Categories","count":259},{"itemId":33582,"itemName":"Active Directory","count":2},{"itemId":33584,"itemName":"Cloud Computing","count":101},{"itemId":33585,"itemName":"General (Networking)","count":154},{"itemId":33581,"itemName":"Networking","count":2}],"articleTypeFilter":[{"articleType":"All Types","count":259},{"articleType":"Articles","count":234},{"articleType":"Cheat Sheet","count":8},{"articleType":"Step by Step","count":16},{"articleType":"Videos","count":1}]},"filterDataLoadedStatus":"success","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2022-05-13T12:59:08+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"https://cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"https://sb\" : \"http://b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"https://sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"https://zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for http://www.dummies.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'https://static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"https://www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":[],"relatedArticlesStatus":"initial"},"routeState":{"name":"ArticleCategory","path":"/category/articles/networking-33581/","hash":"","query":{},"params":{"category":"networking-33581"},"fullPath":"/category/articles/networking-33581/","meta":{"routeType":"category","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"sfmcState":{"newsletterSignupStatus":"initial"}}
Logo
  • Articles Open Article Categories
  • Books Open Book Categories
  • Collections Open Collections list
  • Custom Solutions
  • Home
  • Technology Articles
  • Information Technology Articles
  • Networking Articles

Networking Articles

All those computers out there in the world? Well, they've gotta talk to one another somehow. We explain how.

Browse By Category

Active Directory

Cisco

Cloud Computing

General (Networking)

Previous slideNext slide

Active Directory

Cisco

Cloud Computing

General (Networking)

Articles From Networking

page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16
page 17
page 18
page 19
page 20
page 21
page 22
page 23
page 24
page 25
page 26

Filter Results

260 results
260 results
Cloud Computing AWS For Admins For Dummies Cheat Sheet

Cheat Sheet / Updated 04-20-2022

Amazon Web Services (AWS) started out small, but has become a vast collection of cloud services that businesses can use to support any activity without having to invest in an IT infrastructure.

View Cheat Sheet
General (Networking) Cisco Networking All-in-One For Dummies Cheat Sheet

Cheat Sheet / Updated 03-01-2022

To create and configure a Cisco network, you need to know about routers and switches to develop and manage secure Cisco systems. Become acquainted with Cisco network devices and code listings; and find out how to manage static routing and view routing information.

View Cheat Sheet
General (Networking) TCP/IP For Dummies Cheat Sheet

Cheat Sheet / Updated 02-28-2022

As a network administrator, you know that TCP/IP is the glue that holds the Internet and the Web together. As well as being familiar with security terms and general definitions, you need to pay attention to RFCs (Requests for Comment) published by the Internet Engineering Task Force. You can comment on, learn from, and submit RFCs yourself.

View Cheat Sheet
Cloud Computing Cloud Computing For Dummies Cheat Sheet

Cheat Sheet / Updated 02-23-2022

Digital transformation is the mantra of many organizations. There is no debate about it: Cloud computing has changed the way businesses operate. Small and mid-sized organizations may be all in on the cloud, while large enterprises are a hybrid and multicloud strategy. The cloud is helping startups challenge industry stalwarts, while at the same time, traditional companies are changing. The first phase of cloud adoption was mostly about cutting costs and changing technology spend from a capital expense to an operating expense. For many years, cloud vendors were focused on reducing costs for commodity compute and storage. While reducing costs is still a major driver of cloud adoption, companies are now leveraging cloud services to transform their businesses. The focus of cloud computing has shifted from reducing costs to gaining business agility, providing developers with the tools they demand and ultimately providing excellent customer care. It’s safe to assume that your organization uses some kind of cloud computing, whether it’s a CRM (customer relationship manager) or HR (human recourses) Software as a Service offerings or Cloud native container-based software development services.

View Cheat Sheet
General (Networking) Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet

Cheat Sheet / Updated 02-03-2022

PowerShell 5.1 is the version of Windows PowerShell that ships with Windows Server 2022, Windows Server 2019, and Windows Server 2016. It’s available for installation on Windows Server 2008 R2 with Service Pack1, Windows Server 2012, and Windows Server 2012 R2. The last three operating systems must have Windows Management Framework 5.1 installed to support PowerShell 5.1. You can upgrade to PowerShell 7.2 fairly easily (the more recent version from Microsoft), though the examples on this Cheat Sheet were only tested in PowerShell 5.1.

View Cheat Sheet
General (Networking) Network Administration: Granting Share Permissions

Article / Updated 12-27-2021

When you first create a file share on your network, all users are granted read-only access to the share. If you want to allow users to modify files in the share or allow them to create new files, you need to add permissions. Here’s how to do this using Windows Explorer: Open Windows Explorer by pressing the Windows key and clicking Computer; then browse to the folder whose permissions you want to manage. Right-click the folder you want to manage and then choose Properties from the contextual menu. The Properties dialog box for the folder appears. Click the Sharing tab; then click Advanced Sharing. The Advanced Sharing dialog box appears. Click Permissions. The dialog box shown appears. This dialog box lists all the users and groups to whom you’ve granted permission for the folder. Initially, read permissions are granted to a group called Everyone, which means that anyone can view files in the share but no one can create, modify, or delete files in the share. When you select a user or group from the list, the check boxes at the bottom of the list change to indicate which specific permissions you’ve assigned to each user or group. Click the Add button. The dialog box shown appears. Enter the name of the user or group to whom you want to grant permission and then click OK. If you’re not sure of the name, click the Advanced button. This action brings up a dialog box from which you can search for existing users. When you click OK, you return to the Share Permissions tab, with the new user or group added. Select the appropriate Allow and Deny check boxes to specify which permissions to allow for the user or group. Repeat Steps 5–7 for any other permissions that you want to add. When you’re done, click OK. Here are a few other thoughts to ponder concerning adding permissions: If you want to grant full access to everyone for this folder, don’t bother adding another permission. Instead, select the Everyone group and then select the Allow check box for each permission type. You can remove a permission by selecting the permission and then clicking the Remove button. If you’d rather not fuss with the Share and Storage Management console, you can set the permissions from My Computer. Right-click the shared folder, choose Sharing and Security from the contextual menu, and then click Permissions. Then you can follow the preceding procedure, picking up at Step 5. The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is most restrictive always applies. If the share permissions grant a user Full Control permission but the folder permission grants the user only Read permission, for example, the user has only Read permission for the folder.

View Article
General (Networking) Using Workgroup Templates Across Your Network

Article / Updated 12-27-2021

Although an occasional sacrifice to the Office gods may make your networking life a bit easier, a template isn’t a place of worship. Rather, a template is a special type of document file that holds formatting information, boilerplate text, and other customized settings that you can use as the basis for new documents. Three Office programs — Word, Excel, and PowerPoint — enable you to specify a template whenever you create a new document. When you create a new document in Word, Excel, or PowerPoint by choosing File → New, you see a dialog box that lets you choose a template for the new document. Office comes with a set of templates for the most common types of documents. These templates are grouped under the various tabs that appear across the top of the New dialog box. In addition to the templates that come with Office, you can create your own templates in Word, Excel, and PowerPoint. Creating your own templates is especially useful if you want to establish a consistent look for documents prepared by your network users. For example, you can create a Letter template that includes your company’s letterhead or a Proposal template that includes a company logo. Office enables you to store templates in two locations. Where you put them depends on what you want to do with them: The User Templates folder on each user’s local disk drive: If a particular user needs a specialized template, put it here. The Workgroup Templates folder on a shared network drive: If you have templates that you want to make available to all network users on the network server, put them here. This arrangement still allows each user to create templates that aren’t available to other network users. When you use both a User Templates folder and a Workgroup Templates folder, Office combines the templates from both folders and lists them in alphabetical order in the New dialog box. For example, the User Templates folder may contain templates named Blank Document and web Page, and the Workgroup Templates folder may contain a template named Company Letterhead. In this case, three templates appear in the New dialog box, in this order: Blank Document, Company Letterhead, and web Page. To set the location of the User Templates and Workgroup Templates folders, follow these steps in Microsoft Word: In Word, create a new document or open an existing document. It doesn't matter which document you use. This step is required simply because word doesn't let you access the template folder locations unless a document is open. Choose File, and then Options. The Word Options dialog box opens. Click the Advanced tab. The Advanced options appear. Scroll down to the General section and then click the File Locations button. The File Locations dialog box appears. Double-click the Workgroup Templates item. This step opens a dialog box that lets you browse to the location of your template files. Browse to the template files and then click OK. You return to the File Locations dialog box. Click OK to dismiss the File Locations dialog box. You return to the Word Options dialog box. Click OK again. The Word Options dialog box is dismissed. Although the User Templates and Workgroup Templates settings affect Word, Excel, and PowerPoint, you can change these settings only from Word. The Options dialog boxes in Excel and PowerPoint don’t show the User Templates or Workgroup Templates options. When you install Office, the standard templates that come with Office are copied into a folder on the computer’s local disk drive, and the User Templates option is set to this folder. The Workgroup Templates option is left blank. You can set the Workgroup Templates folder to a shared network folder by clicking Network Templates, clicking the Modify button, and specifying a shared network folder that contains your workgroup templates.

View Article
General (Networking) Network Administration: How to Create a New User in Active Directory

Step by Step / Updated 12-27-2021

User accounts are among the basic tools for managing a Windows server. As a network administrator, you’ll spend a large percentage of your time dealing with user accounts To create a new domain user account in Active Directory, follow these steps:

View Step by Step
General (Networking) How to Manage a Network Server Remotely

Article / Updated 12-27-2021

One of the most useful tools available to system administrators is a program called Remote Desktop Connection. Remote Desktop Connection lets you connect to a server computer from your own computer's desktop and use it as though you were actually sitting at the server. The program enables you to manage your servers from the comfort of your own office, without having to walk down to the server room. Remote Desktop Connection is especially important if you're using virtual servers. Because virtual servers have no real hardware, including keyboards, mice, or monitors, Remote Desktop Connection is the primary way you interact with them. Before you can use Remote Desktop Connection to access a server, you must enable remote access on the server. You can do that from the System Properties dialog box. Here are the steps: Open the Control Panel. Double-click System. Click the Remote Settings link. Click the Remote Tab. Select the Allow Remote Connections to This Computer radio button. Click OK. All versions of Windows come with a program called the Remote Desktop Client, which you can use to connect to a server remotely. Here are the steps for Windows 7: Click the Start button, type the word Remote, and then click the Remote Desktop Connection icon. Enter the name of the server you want to connect to. Click the Connect button. Log on and use the server.

View Article
General (Networking) Networking For Dummies Cheat Sheet

Cheat Sheet / Updated 12-27-2021

Managing a small computer network is well within your reach, but it's vital to track key information that's unique to your network. Begin by recording your network and Internet connection information in one place, making it easy to find and readily available when you need it. Then, get to know some of the basic networking concepts such as pin connections and IP address ranges — and become familiar with useful websites for networking information.

View Cheat Sheet
page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16
page 17
page 18
page 19
page 20
page 21
page 22
page 23
page 24
page 25
page 26

Quick Links

  • About For Dummies
  • Contact Us
  • Activate A Book Pin

Connect

Opt in to our newsletter!

By entering your email address and clicking the “Submit” button, you agree to the Terms of Use and Privacy Policy & to receive electronic communications from Dummies.com, which may include marketing promotions, news and updates.

About Dummies

Dummies has always stood for taking on complex concepts and making them easy to understand. Dummies helps everyone be more knowledgeable and confident in applying what they know. Whether it's to pass that big test, qualify for that big promotion or even master that cooking technique; people who rely on dummies, rely on it to learn the critical skills and relevant information necessary for success.

Terms of Use
Privacy Policy
Cookies Settings
Do Not Sell My Personal Info - CA Only