0% found this document useful (0 votes)
67 views

Updated Windows Basics

The document provides information on various Windows networking commands and tools. It discusses how to use commands like ipconfig, ping, tracert, net start/stop to manage network settings and troubleshoot connectivity issues. It also covers how to configure network adapter settings, proxy settings, static routes, and set up a TFTP server.

Uploaded by

Sharad Pawar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views

Updated Windows Basics

The document provides information on various Windows networking commands and tools. It discusses how to use commands like ipconfig, ping, tracert, net start/stop to manage network settings and troubleshoot connectivity issues. It also covers how to configure network adapter settings, proxy settings, static routes, and set up a TFTP server.

Uploaded by

Sharad Pawar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

WINDOWS BASICS

IN
NETWORKING
INDEX
NO TOPICS

1 Installing Certificates In Google Crome

2 Open Command Prompt

3 DNS Flush

4 IP release

5 IP renew

6 Ping

7 Tracert

8 Services Start/Stop

9 Telnet Enable/Disable

10 Duplex

11 Proxy Configration

12 Proxy Bypass

13 Static Route

14 IIS Manager

15 Data Transfer From Device To TFTP Server

16 Hyperterminal

17 Putty

18 WinSCP

19 NSLookup

20 RDP

21 Ulternet IP

22 ON/OFF windows firewall

23 Enable/Disable Lan Card


1. Installing Certificates in Google Chrome
2.Open command prompt(cmd)
1. In Windows, go to Start and select Run.
2. Type in cmd (Windows 2000/XP) or command (Windows 98/ME) into the Open: field. Hit
the enter key or click OK. The DOS prompt should open.

3. DNS Flush
Most operating systems and DNS clients will automatically cache IP addresses and other DNS
results, this is done in order to speed up subsequent requests to the same hostname. Sometimes
bad results will be cached and therefore need to be cleared from the cache in order for you to
communicate with the host correctly. All major operating systems allow you to force this
process. Outlined below are the common steps you will need to follow in order to flush your
DNS cache.

Command- Ipconfig/flushdns
4. IP release [ Adapter ] :
Sends a DHCP RELEASE message to the DHCP server to release the current DHCP
configuration and discard the IP address configuration for either all adapters (if an adapter is not
specified) or for a specific adapter if the Adapter parameter is included. This parameter disables
TCP/IP for adapters configured to obtain an IP address automatically. To specify an adapter
name, type the adapter name that appears when you use ipconfig without parameters.

Command- Ipconfig/release

5. IP renew [ Adapter ] :
Renews DHCP configuration for all adapters (if an adapter is not specified) or for a specific
adapter if the Adapter parameter is included. This parameter is available only on computers with
adapters that are configured to obtain an IP address automatically. To specify an adapter name,
type the adapter name that appears when you use ipconfig without parameters.

Command- Ipconfig/renew
6. Ping
Ping 192.168.45.1
Ping is the primary tool for troubleshooting IP-level connectivity. When a ping
192.168.45.1 command is issued, the utility sends an ICMP Echo Request to a 192.168.45.1.

Ping 192.168.45.1 –t
Pings the 192.168.45.1 until stopped. To see statistics and continue type Control-Break. To stop type Control-C.
Ping -a 192.168.42.12
Resolves addresses to host names of IP 192.168.42.12

Ping –n 6 192.168.42.12
Sets number of echo requests to send to 6
Ping –l 1472 192.168.42.12
Sends packets of a 1472 bytes size.

Ping -l 1473 –f 192.168.42.12


Sets the "Don't Fragment" flag in outgoing packets of 1473 bytes size.
7. Tracert

Tracert 14.141.63.189
Tracert is a route tracing utility that display a list of near-side router interfaces of the routers
along the path between a source host and a destination 14.141.63.189. Tracert uses the IP TTL
field in ICMP Echo Requests and ICMP Time Exceeded messages to determine the path from a
source to a destination through an IP internetwork.

Tracert -d 14.141.63.189
Specifies to not resolve addresses of router interfaces to host names.
Tracert -h 3 14.141.63.189
Specifies a maximum number of 3 hops to reach destination 14.141.63.189.

8. To enable Services

 Start or stop Services from the Windows interface

1. Open the Services MMC snap-in. Click Start, and then type services.msc in the Start
Search box.
2. If the User Account Control dialog box appears, confirm that the action it displays is what you
want, and then click Continue.
3. Right-click any services that you want to start or stop, and then click Properties.
4. In the Startup type list, select one of the following:
o Automatic (Delayed Start) to start service after Windows starts and all boot processes
have finished

o Automatic to start Service when Windows starts

o Manual to allow Service to be started and stopped when needed

o Disabled to prevent Service from running

5. To start or stop the service, on the respective services Properties dialog box,
click Start or Stop. You can also start or stop the service on the main Services page by
selecting services in the list, and then using the start (triangle) and stop (square) icon buttons on
6. the toolbar at the top of the page.
 Start/Stop services by using Command Prompt
1. Open an elevated command prompt. Right-click a Command Prompt shortcut, and then
click Run as administrator.
2. If the User Account Control dialog box appears, confirm that the action it displays is what you
want, and then click Continue.
3. Type one of the following commands:
o To start Telnet Server, type net start service name.

o To stop Telnet Server, type net stop service name

9. To enable Telnet Client


1. Type “appwiz.cpl” in Command Prompt.
2. Select “Turn Windows features on or off”

3. Tick on Telnet Client


How to Telnet :

Command: telnet <destination address> <port number>

10. Duplex
In telecommunication, duplex communication means that both ends of the communication can send and
receive signals at the same time. Full-duplexcommunication is the same thing. Half-duplex is also
bidirectional communication but signals can only flow in one direction at a time. Simplex communication
means that communication can only flow in one direction and never flow back the other way.

1. Click the Start button and select Control Panel


2. Select Network and Internet
3. Select Network and Sharing Center
4. Select your network adapter, in this case “Local Area Connection”
5. Select Properties (Admin Rights required here so Admin Sign in page will pop up)
6. Click the Configure button
7. Select the Advanced tab.
8. Select Speed & Duplex and the pull down button for Auto Negotiation.
9. Select Auto. Click OK

11. Proxy configuration in windows


1. Click the Chrome menu button. This is located at the top-right corner of the Chrome window, and
looks like three horizontal bars.
2. Select Settings. This will open a new tab in your browser. ...

3. Click the “Change proxy settings” button. ...


4. Click on Connections Tab…
5. Click the “LAN settings” button. ...
6. Enter your proxy information.
12. Proxy Bypass in windows

1. Click the Chrome menu button. This is located at the top-right corner of the Chrome window, and
looks like three horizontal bars.
2. Select Settings. This will open a new tab in your browser. ...
3. Click the “Change proxy settings” button. ...
4. Click on Connections Tab…..
5. Click the “LAN settings” button. ...
6. Select the Bypass proxy server for local addresses.
7. Click on advanced tab.
8. Enter all the IP address for which you want to bypass proxy in “Do not use proxy server for addresses
beginning with”
13. Static Route
Route is used to view and modify the IP routing table.
To configure Static Route: route add <destination address> mask <netmask>
<gateway>

Route add 192.168.45.0 mask 255.255.255.0 192.168.45.1

It adds a destination route that to reach 192.168.45.0/24, the gateway is


192.168.45.1

Route print

Prints the routes for host.


14. IIS manager
 Internet Information Services (IIS) is a flexible, general-purpose web server from
Microsoft that runs on Windows systems to serve requested HTML pages or files.
 An IIS web server accepts requests from remote client computers and returns the
appropriate response. This basic functionality allows web servers to share and deliver
information across local area networks, such as corporate intranets, and wide area
networks, such as the internet.
 A web server can deliver information to users in several forms, such as static webpages
coded in HTML; through file exchanges as downloads and uploads; and text documents,
image files and more.

1. Click Start, and then click Control Panel.


2. Do one of the following:
o If you are using Windows Vista® or Windows Server® 2008, click System and
Maintenance, and then click Administrative Tools.

o If you are using Windows® 7 or Windows Server® 2008 R2, click System and
Security, and then click Administrative Tools.

3. In the Administrative Tools window, double-click Internet Information Services (IIS)


Manager.
15. Data Transfer From Device to TFTP server
Update firmware of a Juniper Switch and was in a need to setup a TFTP server. TFTP is mainly
used for file transfers between devices on UDP Port 69. If we use Microsoft Windows based
laptop and wanted to setup th+is TFTP server in laptop itself.

how to setup a very simple TFTP Server

o Open tftp64, click on Settings button.


o The TFTPD64 settings window will open as shown below.

o Put a check mark only


to TFTP
Server option. Remove
checkmark from all
other options.

Note: Be very careful with the DHCP option because if you keep this option checked, then your laptop
can act like a DHCP Server in your network. So be careful with the options that you select.
o Click on TFTP tab, the window will look as shown below.
Click on Browse button to specify Base Directory. Specify the Base Directory of the TFTP Server.
Select any folder in your laptop as the Base Directory.

o All the files transferred using TFTP Server will be placed in this folder.

o Select the same TFTP folder (C:\TFTP) as the Base directory. Then click on OK button.
o Under TFTP Security, select the option None (we can also use Standard).
o Under Advanced TFTP Options, select Option negotiation, Show Progress bar, Translate
Unix file names and Allow “\” as virtual

o To set the IP address for TFTP server, please select the option Bind TFTP to this address then
select the IP address available.

o Click on OK. We will receive a window asking to restart TFTPD64 to apply the new settings.
Click on OK and close all TFTP windows which were open in your laptop.
o Re-open TFTPD64 now. Once the program open, ensure that we selected same IP address
for Server Interface. The TFTP64 application should be running when any TFTP related job is
done.

o We can find whether anyone is accessing the TFTP Server. When someone copy any file from
TFTP server, a tiny file copy window will show statistics and progress bar.

o If we wish to find we can click on Log Viewer and see the logs there.
16. Hyperterminal

 HyperTerminal is a program that you can use to connect to other computers,


Telnet sites, bulletin board systems (BBSs), online services, and host
computers. HyperTerminal connections are made using a modem, a null
modem cable (used to emulate modem communication), or an Ethernet
connection.

 HyperTerminal has capabilities beyond making connections to other


computers. It can, for example, transfer large files from a computer onto your
portable computer using a serial port rather than requiring you to set up your
portable computer on a network. It can help debug source code from a remote
terminal. It can also communicate with many older, character-based computers.

 HyperTerminal records the messages passed to and from the computer or


service on the other end of your connection. It can therefore serve as a valuable
troubleshooting tool when setting up and using your modem. To make sure that
your modem is connected properly or to view your modem's settings, you can
send commands through HyperTerminal and check the results. HyperTerminal
also has scroll functionality that enables you to view received text that has
scrolled off the screen.
17. Putty

 Putty is a free and open-source terminal emulator, serial console and network
file transfer application. It supports several network protocols,
including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also
connect to a serial port. The name "PuTTY" has no definitive meaning.

 PuTTY is a very versatile tool for remote access to another computer. It's
probably used more often by people who want secure remote shell access to a
UNIX or Linux system than for any other purpose, though that is only one of
its many uses.

o It supports all of the following protocols:

 Raw : The raw protocol is normally used for network debugging.

 Rlogin : This is an unencrypted UNIX remote login protocol that uses port
513 by default.

 Serial : The serial option is used to connect to a serial line. The most common
purpose for this is to establish a serial connection between computers in lieu of
an Ethernet or other network connection.

 SSH : As already noted, SSH is an encrypted secure remote login protocol,


which uses port 22 by default.
 Telnet : Like rlogin, Telnet (telecommunication network) is an unencrypted
remote login protocol. It typically uses port 23 and is available on many
systems other than UNIX. Like rlogin, Telnet has waned in popularity due to
privacy concerns.
 In addition to the five protocols supported by PuTTY, it also supports features
such as saved session configurations, session logging, locale (language)
settings, and proxy sessions.

18. WinSCP

 WinSCP is a free SFTP and FTP client for Windows, and a multi-functional
tool that improves your productivity.

 WinSCP copies files between and remote computers using multiple protocols:
FTP, FTPS, SCP, SFTP, or WebDAV. And WinSCP offers an intuitive
interface.

 You can also automate WinSCP functionality using .NET assembly or simple
batch file scripting.

 Use WinSCP for common operations with files and edit files directly from
WinSCP using WinSCP internal text editor, or by integrating with an external
text editor.

 WinSCP operations are not limited to individual files;

 WinSCP offers several ways to synchronize your remote and local directories.

 WinSCP integrates with Pageant (PuTTY authentication agent) for full support
of public key authentication with SSH. Admins love WinSCP support for
portable operation using a configuration file instead of registry entries, suitable
for operation from removable media.
19. NSLookup
 Nslookup is a useful tool for troubleshooting DNS problems, such as host
name resolution. When you start Nslookup, it shows the host name and IP
address of the DNS server that is configured for the local system, and then
display a command prompt for further queries. If you type a question mark
( ? ), Nslookup shows all available commands. You can exit the program by
typing exit .

 To look up a host's IP address using DNS, type the host name and press Enter.
Nslookup defaults to using the DNS server configured for the computer on
which it is running, but you can focus it on a different DNS server by
typing server < name> (where < name> is the host name of the server you
want to use for future lookups). Once another server is specified, anything
entered after that point is interpreted as a host name.

 Nslookup employs the domain name devolution method. If you type in a host
name and press ENTER, Nslookup appends the domain suffix of the computer
(such as cswatcp.reskit.com) to the host name before querying the DNS. If the
name is not found, then the domain suffix is "devolved" by one level (in this
case to reskit.com) and the query is repeated. Windows 2000 computers only
devolve names to the second level domain (reskit.com in this example), so if
this query fails, no further attempts are made to resolve the name. If a fully
qualified domain name is typed in (as indicated by a trailing dot) then the DNS
server is only queried for that name and no devolution is performed. To look
up a host name that is completely outside your domain, you must type in a
fully qualified domain name.

20. RDP-
 Connect to another computer using Remote Desktop Connection

With Remote Desktop Connection, you can connect to a computer running Windows
from another computer running Windows that's connected to the same network or to
the Internet. For example, you can use all of your work computer's programs, files, and
network resources from your home computer, and it's just like you're sitting in front of
your computer at work.

To connect to a remote computer, that computer must be turned on, it must have a
network connection, Remote Desktop must be enabled, you must have network access
to the remote computer (this could be through the Internet), and you must have
permission to connect. For permission to connect, you must be on the list of users.
Before you start a connection, it's a good idea to look up the name of the computer
you're connecting to and to make sure Remote Desktop connections are allowed
through its firewall.

If you're user account doesn't require a password to sign in, you'll need to add a
password before you're allowed to start a connection with a remote computer.

 To allow remote connections on the computer you want to connect to

o Open System by clicking the Start button, right-clicking Computer, and


then clicking Properties.
o Click Remote settings.

o If you're prompted for an administrator password or confirmation, type


the password or provide confirmation. Under Remote Desktop, select one
of the three options.

o Click Select Users. If you're an administrator on the computer, your current


user account will automatically be added to the list of remote users and
you can skip the next two steps.

o In the Remote Desktop Users dialog box, click Add.

o In the Select Users or Groups dialog box, do the following:

o To specify the search location, click Locations, and then select the location
you want to search.

o In Enter the object names to select, type the name of the user that you
want to add, and then click OK.

o The name will be displayed in the list of users in the Remote Desktop
Users dialog box. Click OK, and then click OK again.

 To start Remote Desktop on the computer you want to work from

o Open Remote Desktop Connection by clicking the Start button. In the


search box, type Remote Desktop Connection, and then, in the list of
results, click Remote Desktop Connection.

o In the Computer box, type the name of the computer that you want to
connect to, and then click Connect. (You can also type the IP address
instead of the computer name.)
21. Set Alternate IP...(two or more IP address at a time)
1. Choose Settings -> Network Connections on the Windows Start menu.
2. Right-click on the Local Area Connection, choose Properties.

3. Highlight Internet Protocol (TCP/IP), click Properties.


4. If you use DHCP, you should disable it: click Use the following IP address and enter
IP address, Subnet mask and Default gateway.
5. Click Advanced... at the bottom.

6. Enter additional IP addresses: click the Add... button and enter a new IP address and
Subnet mask.
22. Turning On/Off windows firewall
1) Open the Control Panel.

2) Click on Windows Firewall.

3) If the Windows Firewall is enabled, the Windows Firewall state will be On. To turn it off, in
. the left navigation pane, click on Turn Windows Firewall on or off.

4) In the Customize Settings window, select Turn off Windows Firewall and click OK.
23.Enable/Disable LAN Card
1. Go to Control Panel
2. Then Network and Internet
3. Then network connection.
4. Right click on adapter and select enable/disable.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy