Download the latest version of the DNS2Go Client from:

Size: px
Start display at page:

Download "Download the latest version of the DNS2Go Client from:"

Transcription

1 Using DNS2Go with your Linksys Cable / DSL Router Many users with Cable and xdsl broadband connections are using hardware routers such as the Linksys Cable/DSL Routers to connect their local area network to the Internet. This tutorial explains basic configuration for your Linksys router with DNS2Go, and setting the router to run a mail and web server on your local area network. DNS2Go works great behind the Linksys Router, or any other hardware or software router (i.e. WinRoute Firewall.) The router WAN (Wide Area Network - or Internet) IP address is typically the only usable address on the router, and this is the IP address that gets published in the DNS2Go Dynamic DNS system. The WAN IP is also referred to as the Public Facing IP Address. Since this WAN IP is the incoming IP Address of the router, the router's PORTS need to be configured if you want to run a server. The router acts as a sort of firewall or NAT (Network Address Translator) and offers basic port filtering for security purposes. This port filtering also prevents you from running a web server, server, or any other server. DNS2Go Client Installation This tutorial assumes you will be running the DNS2Go Client Software on one of the PC's behind the Linksys router, basically any PC on the local area network that is connected to the router will work. Download the latest version of the DNS2Go Client from: Sign-up for a New DNS2Go domain or Transfer an existing Top Level Domain to the DNS2Go service. Once the DNS2Go Client software is downloaded and installed you will need to perform two initial tasks: Port 1227 will need to be opened in the router. The DNS2Go Client software communicates with our DNS2Go Servers using port 1227 for both UDP and TCP. (see Port Range Forwarding below) Enter your Domain Name and Registration Key into the DNS2Go Client Registration Tab.

2 With the DNS2Go Client running and connected to the DNS2Go Servers, the DNS2Go Client should show the IP address of the WAN port of the router. This is your Public Facing IP Address. The DNS2Go Rocket should appear in flight and indicate it is Connected to the DNS2Go Service.

3 Running Servers (Web, SMTP, FTP) on your Local Area Network (LAN) We assume that you have the DNS2Go Client software running, connected to the DNS2Go Server and displaying the correct Public Facing IP Address, and you have a web server, FTP server and or server set up for your domain. Important: DNS2Go is NOT nor does it provide Web Server, FTP Server or Mail Server functionality. DNS2Go merely provides you the ability to run such servers on a dynamic (changing) IP address by associating your current IP address with your static domain name. The Main Setup Screen of the Linksys Cable/DSL BEFSR41 Router shows the Hostname, Firmware version and more. When you set the Linksys router up, you need to configure the WAN and LAN settings under the Linksys SETUP Screen. Once you get the router up and running DHCP will need to be configured properly. To use servers on your LAN behind the Linksys router, and host your own WWW and FTP servers on the Internet, you should use static IP's on your LAN. Please consult the Linksys User Guide for instructions on Initial Router Setup and how to configure DHCP. If using DHCP you should set the server to an IP address outside of the DHCP range. Since the screenshot below shows the starting DHCP range at , and 50 users, that means that we can set a static IP on our server to and not have a problem or IP conflict. Some routers work fine with DHCP and port forwarding, and some do not. It all depends on the router and the firmware version. If you have problems with port forwarding and DHCP, set the server to a static LAN IP and that should fix the problem.

4 Port Range Forwarding To run Servers behind your router you need to know the Incoming PORT(s) of the desired service, and once you have the port(s), you can set the port as shown in the example below for Passive FTP (Port 20-21) and Web (port 80) as well as SMTP (25). Once you decide what PC is going to run the web, ftp, or server, you need to forward the proper port to the proper Internal IP address of the server. For example: - We have 1 PC on the internal network; the server is set at We also have another PC, that has a Web, FTP and Mail Server that has the LAN IP Address of , so in the example below, we set SERVICE PORT 80 to IP ADDRESS We have a FTP and SMTP Mail Server as well, so these ports (20-21 and 25) are also set to After you configure the ports to the proper IP Address, then click the apply button. This sets the router to forward the proper ports to your servers. To add other applications, you need to know the Service Port(s) and then you need to set the server up on your LAN and set the proper IP address. For more information on the Linksys cable and DSL router, please see the Linksys website at

5 Common Service Ports 20 - FTP data 21 - FTP 22 - SSH 23 - Telnet 25 - SMTP 43 - whois 53 - DNS 68 - DHCP 80 - HTTP POP SFTP NNTP NTP NetBIOS-ns NetBIOS-dgm NetBIOS IMAP SNMP IRC LDAP SSL SMB Doom SIMAP Ports between 1024 and are known as the Registered Ports. Basically, programs are supposed to register their use of these ports and thereby try to be careful and avoid stomping on each other. Here are some common ports and their programs DNS2Go Client Lotus Notes Microsoft SQL Server Citrix ICA Protocol Oracle SQL Citrix ICA / Microsoft Terminal Server NFS (Network File System) mysql ICQ Yahoo! Messenger AOL Instant Messenger PCAnywhere VNC VNC X Windowing System Napster RealServer / QuickTime Unreal HTTP Quake Half-Life Quake III VisNetic MailServer Control DNS2Go Support Additional DNS2Go Support Options and Material is available at:

TCP, UDP Ports, and ICMP Message Types1

TCP, UDP Ports, and ICMP Message Types1 Appendix A APPENDIX A TCP, UDP Ports, and ICMP Message Types1 I list useful TCP, UDP ports, and ICMP message types in this appendix. A comprehensive list of registered TCP and UDP services may be found

More information

Addresses, Protocols, and Ports Reference

Addresses, Protocols, and Ports Reference APPENDIXA Addresses, Protocols, and Ports Reference This appendix provides a quick reference for the following topics: IP Addresses and Subnet Masks Protocols and Applications TCP and UDP Ports ICMP Types

More information

1 of 5 5/19/05 9:48 AM

1 of 5 5/19/05 9:48 AM 1 of 5 5/19/05 9:48 AM "Well Known" TCP and UDP Ports Used By Apple Software Products This document lists TCP and UDP ports used by Apple software products, such as Mac OS 9, Mac OS X, Mac OS X Server,

More information

Network-Based Application Recognition

Network-Based Application Recognition Network-Based Application Recognition Last updated: September 2008 Common questions and answers regarding Cisco Network-Based Application Recognition (NBAR) follow. Q. What is NBAR? A. NBAR, an important

More information

Supported services. 21/tcp FTP File transfer. 22/tcp SSH Secure shell. 23/tcp Telnet Terminal access. 37/tcp Time Time. 80/tcp HTTP WWW pages

Supported services. 21/tcp FTP File transfer. 22/tcp SSH Secure shell. 23/tcp Telnet Terminal access. 37/tcp Time Time. 80/tcp HTTP WWW pages Supported services For security reasons stricter rules are applied to networks engaged in the eduroam project. The eduroam network is connected to Internet via Cisco PIX firewall. Everything that is not

More information

Addresses, Protocols, and Ports

Addresses, Protocols, and Ports APPENDIXB This appendix provides a quick reference for IP addresses, protocols, and applications. This appendix includes the following sections: IPv4 Addresses and Subnet Masks, page B-1 IPv6 Addresses,

More information

Firewall Simulation COMP620

Firewall Simulation COMP620 Firewall Simulation COMP620 Firewall Simulation The simulation allows participants to configure their own simulated firewalls using Cisco-like syntax. Participants can take benign or malicious actions

More information

The Administration Tab - Diagnostics

The Administration Tab - Diagnostics The Administration Tab - Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection.

More information

Addresses, Protocols, and Ports

Addresses, Protocols, and Ports This chapter provides a quick reference for IP addresses, protocols, and applications. IPv4 Addresses and Subnet Masks, page 1 IPv6 Addresses, page 5 Protocols and Applications, page 11 and Ports, page

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

EdgeMarc 250W Network Services Gateway

EdgeMarc 250W Network Services Gateway EdgeMarc 250W Network Services Gateway Quick Start Guide Version 1.0 Page 1 of 7 200-250EW-001 Before You Start Please read this guide thoroughly as it describes the basic installation of the device. Refer

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Legal and notice information

Legal and notice information Legal and notice information Copyright 2017 Trend Micro Incorporated. All rights reserved. TippingPoint, the TippingPoint logo, and Digital Vaccine are trademarks or registered trademarks of Trend Micro

More information

Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list.

Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list. 8.1. Access List Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list. Access lists describe the traffic type that will be controlled.

More information

How to open ports in the DSL router firmware version 2.xx and above

How to open ports in the DSL router firmware version 2.xx and above How to open ports in the DSL router firmware version 2.xx and above This example shows how to open port 3389 (which is used by Remote Desktop service) in the DSL router running firmware version 2.xx or

More information

HP ArcSight Port and Protocol Information

HP ArcSight Port and Protocol Information Important Notice HP ArcSight Port and Protocol Information The information (data) contained on all sheets of this document constitutes confidential information of Hewlett- Packard Company or its affiliates

More information

Advanced Security and Forensic Computing

Advanced Security and Forensic Computing Advanced Security and Forensic Computing Unit 2: Network Security Elements Dr Dr Bill Buchanan, Reader, School of of Computing. >Unit 2: 2: Network Security Elements Advanced Security and Forensic Computing

More information

200AE1 Network Services Gateway

200AE1 Network Services Gateway 200AE1 Network Services Gateway Quick Start Guide Version 1.0 Before You Start Please read this guide thoroughly as it describes the basic installation of the device. Refer to online help for assistance

More information

Default Application Policies

Default Application Policies APPENDIXA The WAAS software includes more than 150 default application policies that help your WAAS system classify and optimize some of the most common traffic on your network. lists the default applications

More information

I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11

I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11 I m InTouch router configuration p. 1 I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11 Note: Different models may vary slightly

More information

Secure Router 1001,1001S, 1002, 1004, and 3120

Secure Router 1001,1001S, 1002, 1004, and 3120 Secure Router 1001,1001S, 1002, 1004, and 3120 Software Release 9.2.5 Readme Notes 1. Release Summary Release Date: 21-September-2007 Purpose: Software maintenance release to address customer found software

More information

Static Application Mapping Using Performance Routing

Static Application Mapping Using Performance Routing Static Application Mapping Using Performance Routing The OER - Application Aware Routing with Static Application Mapping feature introduces the ability to configure standard applications using just one

More information

Internet Load Balancing Guide. Peplink Balance Series. Peplink Balance. Internet Load Balancing Solution Guide

Internet Load Balancing Guide. Peplink Balance Series. Peplink Balance. Internet Load Balancing Solution Guide Peplink Balance Internet Load Balancing Solution Guide http://www.peplink.com Copyright 2010 Peplink Internet Load Balancing Instant Improvement to Your Network Introduction Introduction Understanding

More information

Windows XP Remote Control Explained

Windows XP Remote Control Explained Windows XP Remote Control Explained last modified 11/30/2001 Jason Simotas www.rethinkit.com Windows XP offers two built-in options for remote control operations allowing you to view (and control) another

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

Best Practice - Allow Aerohive Access Points Behind a CloudGen Firewall Access to Hive Manager NG

Best Practice - Allow Aerohive Access Points Behind a CloudGen Firewall Access to Hive Manager NG Best Practice - Allow Aerohive Access Points Behind a CloudGen Firewall Access to Hive Manager NG Aerohive devices running HiveOS such as Aerohive Access Points must be able to communicate with either

More information

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a

More information

RX3041. User's Manual

RX3041. User's Manual RX3041 User's Manual Table of Contents 1 Introduction... 2 1.1 Features and Benefits... 3 1.2 Package Contents... 3 1.3 Finding Your Way Around... 4 1.4 System Requirements... 6 1.5 Installation Instruction...

More information

4-Port Broadband user manual Model

4-Port Broadband user manual Model 4-Port Broadband Router user manual Model 524537 INT-524537-UM-0309-02 introduction Thank you for purchasing the INTELLINET NETWORK SOLUTIONS 4-Port Broadband Router, Model 524537. Combining a router,

More information

Global Information Assurance Certification Paper

Global Information Assurance Certification Paper Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

The Applications and Gaming Tab - Port Range Forward

The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized

More information

Hands-On Activity. Firewall Simulation. Simulated Network. Firewall Simulation 3/19/2010. On Friday, February 26, we will be meeting in

Hands-On Activity. Firewall Simulation. Simulated Network. Firewall Simulation 3/19/2010. On Friday, February 26, we will be meeting in Hands-On Activity Firewall Simulation COMP620 On Friday, February 26, we will be meeting in the Graham 212 lab to participate in a firewall configuration simulation. This simulator was written by Dr. Williams

More information

Manual Ftp Windows Server 2008 Firewall Port Forward

Manual Ftp Windows Server 2008 Firewall Port Forward Manual Ftp Windows Server 2008 Firewall Port Forward SMB/CIFS, FTP and WebDAV access is available allowing the use of existing client software to access the Alfresco data store. This allows you to browse

More information

Section 1.1: Networking Overview

Section 1.1: Networking Overview Section 1.1: Networking Overview This section provides an introduction to networking. Students will become familiar with the following aspects of a network: Components of a network o Computers o Transmission

More information

Assignment - 1 Chap. 1 Wired LAN s

Assignment - 1 Chap. 1 Wired LAN s Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how

More information

Chapter 14: Introduction to Networking

Chapter 14: Introduction to Networking Chapter 14: Introduction to Networking Complete CompTIA A+ Guide to PCs, 6e How different networks are wired (or wireless) How to identify common network cables How Ethernet works About the OSI and TCP/IP

More information

SETUP FOR OUTLOOK (Updated October, 2018)

SETUP FOR OUTLOOK (Updated October, 2018) EMAIL SETUP FOR OUTLOOK (Updated October, 2018) This tutorial will show you how to set up your email in Outlook using IMAP or POP. It also explains how to configure Outlook for MAC. Click on your version

More information

Technical Support Information

Technical Support Information Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the LAN port of the Broadband

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Nubo on premise POC requirements for VMWare ESXi

Nubo on premise POC requirements for VMWare ESXi for VMWare ESXi Version 1 Date October, 2015 page 1 Table of Contents 1. About this document 2. Nubo POC Architecture Diagram 3. Hardware Requirements 4. Software Requirements 5. Network & Settings Requirements

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as

More information

Contents. Cable/DSL Firewall Router

Contents. Cable/DSL Firewall Router Contents Default Settings & Facts... 3 NetComm Cable/DSL Firewall Router Quick Start... 4 One page setup for Telstra Bigpond Cable... 4 One page setup for Optus Cable... 5 One page setup for most ADSL

More information

BCM50 Rls 6.0. Router - IP Firewall. Task Based Guide

BCM50 Rls 6.0. Router - IP Firewall. Task Based Guide BCM50 Rls 6.0 Router - IP Firewall Task Based Guide Copyright 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete

More information

EdgeMarc 4552 Networking Gateway

EdgeMarc 4552 Networking Gateway EdgeMarc 4552 Networking Gateway Quick Start Guide Version 1.0 Page 1 of 7 201-4552-001 Before You Start Please read this guide thoroughly as it describes the basic installation of the device. Additional

More information

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.

More information

Quick Network Setup Guide

Quick Network Setup Guide PWR PWR HDD HDD USB USB Quick Network Setup Guide Use Router to Connect to Network By using a router, you can connect your computer and 1-3 DVRs to the Internet through sharing by using a XDSL or cable

More information

LKR Port Broadband Router. User's Manual. Revision C

LKR Port Broadband Router. User's Manual. Revision C LKR-604 4-Port Broadband Router User's Manual Revision C 1 Contents 1 Introduction... 4 1.1 Features... 4 1.2 Package Contents... 4 1.3 Finding Your Way Around... 5 1.3.1 Front Panel... 5 1.3.2 Rear Panel

More information

General Terms Node - File Permissions - file permissions file

General Terms Node - File Permissions - file permissions file CIS 375 General Terms Node - A networked computing device that takes a protocol address andcan initiate and respond to communication from other networked devices that employ similar protocols. File Permissions

More information

4562 Converged Networking Router

4562 Converged Networking Router 4562 Converged Networking Router Quick Start Guide Version 1.0 Page 1 of 7 200-4562-001 Before You Start Please read this guide thoroughly as it describes the basic installation of the device. Additional

More information

Broadband Router User s Manual. Broadband Router User s Manual

Broadband Router User s Manual. Broadband Router User s Manual Broadband Router User s Manual Table of Contents 1 Introduction... 1 1.1 Features... 1 1.2 Package Contents... 2 1.3 LEDs & Connectors of Broadband Router... 2 1.4 System Requirements... 2 1.5 Installation

More information

Debian/GNU Linux Networking

Debian/GNU Linux Networking Debian/GNU Linux Networking Basics of the Networking Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Networking 1/41 Agenda 1 Networks 2 Ethernet 3 Internet Protocol 4 TCP 5 DHCP 6 Check Network

More information

Connecting From Anywhere. without iteleport Connect

Connecting From Anywhere. without iteleport Connect Connecting From Anywhere without iteleport Connect Who should use this information Ideally, you should use iteleport Connect to set up access from anywhere. However, you might not be able to use that if:

More information

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client.

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client. Introduction: Intended Audience The StrideLinx Remote Access Solution is designed to offer safe and secure remote access to industrial equipment worldwide for efficient remote troubleshooting, programming

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network

More information

User Manual of RCS1~AP10

User Manual of RCS1~AP10 User Manual of RCS1~AP10 This manual is subject to tell users how to use this CAPWAP Broad Band Router with WLAN Controller and PoE Switch function, suit for those familiar with basic networking knowledge

More information

INTERNET SECURITY ROUTER FAQ

INTERNET SECURITY ROUTER FAQ 1 Introduction Release date: 5/4/2004 This document contains the frequently asked questions (FAQ) for SL-series Internet Security Router including SL- 1000, SL-500 and possibly the future SL- models. 2

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks WJ Buchanan. ASMN (1) Advanced Security and Mobile Networks Unit 1: Network Security Application Presentation Session Transport Network Data Link Physical OSI Application Transport Internet Internet model

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components

More information

VG422R. User s Manual. Rev , 5

VG422R. User s Manual. Rev , 5 VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE

More information

CCNA DISCOVERY V4.0 WORKING AT A SMALL-TO-MEDIUM BUSINESS OR ISP INSTRUCTOR REFERENCE GUIDE. Prepared by Cisco Learning Institute

CCNA DISCOVERY V4.0 WORKING AT A SMALL-TO-MEDIUM BUSINESS OR ISP INSTRUCTOR REFERENCE GUIDE. Prepared by Cisco Learning Institute CCNA DISCOVERY V4.0 WORKING AT A SMALL-TO-MEDIUM BUSINESS OR ISP COMPARISON OF NEW CURRICULA WITH EXISTING CURRICULA Prepared by Cisco Learning Institute June 25, 2007 Working for a Small-to-Medium Business

More information

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide V 3. 8 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeBPR XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS

More information

General Important Protocols for Examination of IA Examination 2018

General Important Protocols for Examination of IA Examination 2018 Protocol General Important Protocols for Examination of IA Examination 2018 DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain

More information

CCProxy. User Manual

CCProxy. User Manual CCProxy Proxy Server for Win98/NT/2000/XP/2003/Vista/2008 www.youngzsoft.net User Manual 2009.01 1 Content 1 Content...1 2 Introduction...3 3 Main Features...4 4 Installation...5 4.1 Step 1 - LAN networks

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Release Date: March 16, 2007 This guide provides detailed description on configuration of the local network which

More information

Nessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT

Nessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT Nessus Scan Report Mon, 15 May 2017 15:27:44 EDT Table Of Contents Hosts Summary (Executive) 192.168.168.134 Hosts Summary (Executive) [-] Collapse All [+] Expand All 192.168.168.134 Summary Critical High

More information

Chapter 8. Network Troubleshooting. Part II

Chapter 8. Network Troubleshooting. Part II Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.

More information

OER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300

OER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300 holddown holddown To configure the Optimized Edge Routing (OER) prefix route dampening timer to set the minimum period of time that a new exit must be used before an alternate exit can be selected, use

More information

Key Features DATA SHEETS. Application centric analysis software delivering answers for application performance problems.

Key Features DATA SHEETS. Application centric analysis software delivering answers for application performance problems. DATA SHEETS Unpublished ClearSight Analyzer The award winning ClearSight Analyzer (CSA) offers advanced application centric monitoring and performance analysis, enabling enterprise Network Administrators

More information

SoHo 401 VPN. Shared Broadband Internet Access VPN Gateway 3-Port Switching Hub, DMZ Port. Quick Install Guide

SoHo 401 VPN. Shared Broadband Internet Access VPN Gateway 3-Port Switching Hub, DMZ Port. Quick Install Guide SoHo 401 VPN Shared Broadband Internet Access VPN Gateway 3-Port Switching Hub, DMZ Port Quick Install Guide i This guide covers only the most common situations. Please refer to the full User Manual on

More information

Protocol Filters APPENDIX

Protocol Filters APPENDIX APPENDIX B The tables in this appendix list some of the protocols that you can filter on the access point. The tables include: Table A-1, Ethertype s Table A-2, IP s Table A-3, IP Port s In each table,

More information

Configuration examples for the D-Link NetDefend Firewall series

Configuration examples for the D-Link NetDefend Firewall series Configuration examples for the D-Link NetDefend Firewall series Scenario: How to configure VLAN Platform Compatibility: All NetDefend Firewall Series Last update: 2008-03-10 Overview In this document,

More information

Port Utilization in Unified CVP

Port Utilization in Unified CVP Utilization in Unified CVP Utilization Table Columns, page 1 Unified CVP Utilization, page 2 Utilization Table Columns The columns in the port utilization tables in this document describe the following:

More information

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge

More information

Multi-site Configuration and Installation Guide Port Forwarding Option

Multi-site Configuration and Installation Guide Port Forwarding Option Multi-site Configuration and Installation Guide Port Forwarding Option V1.0 7-24-2006 Overview What this guide covers This guide will assist you in setting up a Wide Area Network (WAN) that allows your

More information

Schablone 2004_08_26. Gigaset SE587 WLAN dsl. Gigaset

Schablone 2004_08_26. Gigaset SE587 WLAN dsl. Gigaset Gigaset SE587 WLAN dsl / eng / A31008-N1083-L171-1-7619 / cover_front_587.fm / 13.11.2007 Gigaset SE587 WLAN dsl Gigaset Gigaset SE587 WLAN dsl / eng / A31008-N1083-L171-1-7619 / SE587_IVZ.fm / 12.12.2007

More information

Gigaset Router / en / A31008-E105-B / cover_front_router.fm / s Be inspired

Gigaset Router / en / A31008-E105-B / cover_front_router.fm / s Be inspired s Be inspired Table of Contents Table of Contents Safety precautions........................... 3 The Gigaset Router........................... 3 Features and Benefits..................................................

More information

Technical Support Information

Technical Support Information Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the DMZ port of the Broadband

More information

Port Forwarding & Case Study

Port Forwarding & Case Study Introduction TalkTalk's responsibility lies with ensuring that this facility works on their routers, they cannot be held responsible for you devices that you are trying to forward to. This document not

More information

On-Line Password Breaks CSC 193 WAKE FOREST. U N I V E R S I T Y Department of Computer Science. Spring 2014

On-Line Password Breaks CSC 193 WAKE FOREST. U N I V E R S I T Y Department of Computer Science. Spring 2014 On-Line Password Breaks CSC 193 WAKE FOREST U N I V E R S I T Y Department of Computer Science Spring 2014 Breaking Passwords We have focused on breaking system passwords Take the password file and run

More information

8.1.4 NAT Application

8.1.4 NAT Application Figure 54 How NAT Works 8.1.4 NAT Application The following figure illustrates a possible NAT application, where three inside LANs (logical LANs using IP Alias) behind the Prestige can communicate with

More information

Port Forwarding Setup (NB7)

Port Forwarding Setup (NB7) Port Forwarding Setup (NB7) Port Forwarding Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. This is most commonly used

More information

BIG-IP DNS: Monitors Reference. Version 12.1

BIG-IP DNS: Monitors Reference. Version 12.1 BIG-IP DNS: Monitors Reference Version 12.1 Table of Contents Table of Contents Monitors Concepts...5 Purpose of monitors...5 Benefits of monitors...5 Methods of monitoring...5 Comparison of monitoring

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Date Version Author Details March 2014 V1.4 NETASQ Update Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 MAIN CHANGES IN VERSION 9 4 Web management

More information

Wireless-G Router User s Guide

Wireless-G Router User s Guide Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network

More information

Different Layers Lecture 21

Different Layers Lecture 21 Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts

More information

IXCHARIOT SERVER AND DESKTOP EDITIONS

IXCHARIOT SERVER AND DESKTOP EDITIONS IXCHARIOT SERVER AND DESKTOP EDITIONS TEST AND IMPROVE APPLICATION PERFORMANCE WITH FLEXIBLE SOFTWARE-BASED TEST TOOL PROBLEM: ENSURING NETWORK CHANGES WON T DISRUPT SERVICE QUALITY AND PERFORMANCE Today

More information

2Wire IG 2700 ADSL Router. RJ45 connecting cable

2Wire IG 2700 ADSL Router. RJ45 connecting cable Technical Support Information Case 6. BT 2Wire 2700 ADSL Router (BT Business Hub) configuration to allow a BT Versatility Broadband Module (BBM) IP Gateway connection for VoIP (IP Trunks and IP Extensions)

More information

BIG-IP Local Traffic Manager : Monitors Reference 13.0

BIG-IP Local Traffic Manager : Monitors Reference 13.0 BIG-IP Local Traffic Manager : Monitors Reference 13.0 Table of Contents Table of Contents Monitors Concepts... 5 Purpose of monitors...5 Benefits of monitors... 5 About icheck functionality for monitors...

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: Internet of Things , Raj Kamal, Publs.: McGraw-Hill Education Lesson 5 TCP/IP suite, TCP and UDP Protocols 1 TCP/IP Suite: Application layer protocols TCP/IP Suite set of protocols with layers for the Internet TCP/IP communication 5 layers: L7, L4, L3, L2 and L1

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 6 Cisco

More information

Avaya AG250 Application Gateway Server Pre-Installation Checklist for Avaya Communication Manager

Avaya AG250 Application Gateway Server Pre-Installation Checklist for Avaya Communication Manager Avaya AG250 Application Gateway Server Pre-Installation Checklist for Avaya Communication Manager The Application Gateway Server delivers business applications to Internet-enabled IP telephones, personal

More information

MANetworkSwitchUserManual. Version 3.1

MANetworkSwitchUserManual. Version 3.1 Factory Defaults 2016-09-07 The following tables describes the factory defaults and what will happen to various settings when you reset the switch. If you want to reset the switch, refer to General Settings

More information

Granular Protocol Inspection

Granular Protocol Inspection The feature adds flexibility to the Cisco IOS Firewall by allowing it to perform a higher degree of inspection of TCP and User Data Protocol (UDP) traffic for most RFC 1700 application types. Finding Feature

More information

Extended ACL Configuration Mode Commands

Extended ACL Configuration Mode Commands Extended ACL Configuration Mode Commands To create and modify extended access lists on a WAAS device for controlling access to interfaces or applications, use the ip access-list extended global configuration

More information