<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jacooch</id>
	<title>ITCwiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jacooch"/>
	<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/w/Special:Contributions/Jacooch"/>
	<updated>2026-04-08T19:35:55Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.38.5</generator>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Routing_Protocol_Commands&amp;diff=4723</id>
		<title>Routing Protocol Commands</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Routing_Protocol_Commands&amp;diff=4723"/>
		<updated>2011-10-13T21:01:13Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{delete| duplicate}}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! &#039;&#039;&#039;Route Protocol&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Builds Topology Map&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Router can independently &#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;determine the shortest path &#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;to every network&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Convergence&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;A periodic/event driven routing updates&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Use of LSP&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;Distance Vector&#039;&#039;&#039;&lt;br /&gt;
| No&lt;br /&gt;
| No&lt;br /&gt;
| Slow&lt;br /&gt;
| Generally no&lt;br /&gt;
| no&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;Link-state&#039;&#039;&#039;&lt;br /&gt;
| Yes&lt;br /&gt;
| Yes&lt;br /&gt;
| Fast&lt;br /&gt;
| Generally yes&lt;br /&gt;
| Yes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
** Information taken from in-class presentation.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! &#039;&#039;&#039;Name&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Class&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Type&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Interior/Exterior&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Default Metric&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Administrative&#039;&#039;&#039; &lt;br /&gt;
&#039;&#039;&#039;Distance&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Hop Count Limit&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Convergance&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Classful/&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Classless&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Update Timers&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Updates&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;VLSM Support&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Algorithm&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Update Address&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Protocol and Port&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;RIPv1&#039;&#039;&#039;&lt;br /&gt;
| Distance Vector&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Hopcount&lt;br /&gt;
| 120&lt;br /&gt;
| 15&lt;br /&gt;
| Slow&lt;br /&gt;
| Classful&lt;br /&gt;
| 30 Seconds&lt;br /&gt;
| Full Table&lt;br /&gt;
| No&lt;br /&gt;
| Bellman-Ford&lt;br /&gt;
| Broadcast&lt;br /&gt;
| UDP port 520&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;RIPv2&#039;&#039;&#039;&lt;br /&gt;
| Distance Vector&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Hopcount&lt;br /&gt;
| 120&lt;br /&gt;
| 15&lt;br /&gt;
| Slow&lt;br /&gt;
| Classless&lt;br /&gt;
| 30 Seconds&lt;br /&gt;
| Full Table&lt;br /&gt;
| Yes&lt;br /&gt;
| Bellam-Ford&lt;br /&gt;
| 224.0.0.9&lt;br /&gt;
| UDP port 520&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;IGRP&#039;&#039;&#039;&lt;br /&gt;
| Distance Vector&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Bandwidth/Delay&lt;br /&gt;
| 100&lt;br /&gt;
| 255 (100 default)&lt;br /&gt;
| Slow&lt;br /&gt;
| Classful&lt;br /&gt;
| 90 seconds&lt;br /&gt;
| Full Table&lt;br /&gt;
| No&lt;br /&gt;
| Bellman-Ford&lt;br /&gt;
| 224.0.0.10&lt;br /&gt;
| IP Protocol 9&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;EIGRP&#039;&#039;&#039;&lt;br /&gt;
| Hybrid (Advanced Distance Vector)&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Bandwidth/Delay&lt;br /&gt;
| 90 (Internal)&lt;br /&gt;
170 (External)&lt;br /&gt;
| 224 (100 default)&lt;br /&gt;
| Very Fast&lt;br /&gt;
| Classless&lt;br /&gt;
| Only when change occurs&lt;br /&gt;
| Only Changes&lt;br /&gt;
| Yes&lt;br /&gt;
| DUAL&lt;br /&gt;
| 224.0.0.10&lt;br /&gt;
| IP Protocol port 88&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;OSPF&#039;&#039;&#039;&lt;br /&gt;
| Link-state&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Cost&lt;br /&gt;
| 110&lt;br /&gt;
| None&lt;br /&gt;
| Fast&lt;br /&gt;
| Classless&lt;br /&gt;
| Only when changes occur (LSA table is refreshed every 30 minutes, however)&lt;br /&gt;
| Only Changes&lt;br /&gt;
| Yes&lt;br /&gt;
| Dijkstra (SPF)&lt;br /&gt;
| 224.0.0.5 (All SPF Routers)&lt;br /&gt;
224.0.0.6 (DR&#039;s and DBR&#039;s)&lt;br /&gt;
| IP Protocol 89&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;IS-IS&#039;&#039;&#039;&lt;br /&gt;
| Link-state&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Cost&lt;br /&gt;
| 115&lt;br /&gt;
| None&lt;br /&gt;
| Fast&lt;br /&gt;
| Classless&lt;br /&gt;
| Only when changes occur&lt;br /&gt;
| Only changes&lt;br /&gt;
| Yes&lt;br /&gt;
| Dijkstra (SPF)&lt;br /&gt;
| N/A&lt;br /&gt;
| N/A&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;BGP&#039;&#039;&#039;&lt;br /&gt;
| Path Vector&lt;br /&gt;
| EGP&lt;br /&gt;
| Exterior&lt;br /&gt;
| Multiple Attributes&lt;br /&gt;
| 20 (External)&lt;br /&gt;
200(Internal)&lt;br /&gt;
| EBGP Neighbors: 1 (Default)&lt;br /&gt;
IBGP Neighbors: None&lt;br /&gt;
| Average&lt;br /&gt;
| Yes&lt;br /&gt;
| Only when changes occur&lt;br /&gt;
| Only changes&lt;br /&gt;
| Yes&lt;br /&gt;
| Best Path Algorithm&lt;br /&gt;
| Unicast&lt;br /&gt;
| TCP port 179&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** Information condensed from http://www.routeralley.com/ra/docs/routing_protocol_comparison.pdf and http://globalconfig.net/ccna-corner/1147/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Network.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Commands for RIP ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router rip&#039;&#039;&#039;  -  Enables RIP as a protocol&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router rip&#039;&#039;&#039;  -  Turns off RIP&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes network&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;version 2&#039;&#039;&#039;  -  Turns on V2 and now RIP will send and receive RIPv2 Packets&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;version 1&#039;&#039;&#039;  -  RIP will send and receive RIPv1 Packets&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  RipV2 summarizes networks at the classful boundary.  This command will turns auto summary off&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;passive-interface s/0/0/1&#039;&#039;&#039;  -  RIP updates will not be sent out this interface&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;neighbor a.b.c.d&#039;&#039;&#039;  -  Defines a specific neighbor to exchange information with&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no ip split-horizon&#039;&#039;&#039;  -  Turns off split horizon (this is on by default)&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;ip split-horizon&#039;&#039;&#039;  -  Turns it back on&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;timers basic 30 60 90 180 270 360&#039;&#039;&#039;  -  Changes timers in RIP: 30=Update timer, 90=Invalid Timer, 180=Hold down timer, 270= Flush timer, 360=Sleep timer&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;default-information originate&#039;&#039;&#039;  -  Generates a default route into RIP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    ** You can verify configurations by running the show commands at the Router# prompt&lt;br /&gt;
    ** Show ip protocol, show ip route, show ip interface brief&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip rip&#039;&#039;&#039;  -  Displays all RIP activity in real time&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;show ip rip database&#039;&#039;&#039;  -  Displays contents of the RIP database&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commands for EIGRP ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router eigrp 100&#039;&#039;&#039;  -  Enables EIGRP as a process. The number &amp;quot;100&amp;quot; is an autonomous system number (ASN) which can be any number between 1 and 65,535. All routers in the same system must use the same ASN&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router eigrp 100&#039;&#039;&#039;  -  Removes EIGRP as a process.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes advertised network&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth &#039;&#039;X&#039;&#039;&#039;&#039;&#039;  -  Sets the bandwidth of this interface to X kilobits to allow EIGRP to make the best metric calculation&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network 1.1.1.1 0.0.0.3&#039;&#039;&#039;  -  Tells which interface or network to include in EIGRP.  Interfaces are configured with addresses that fall within the wildcard mask range of the network statement.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;auto-summary&#039;&#039;&#039;  -  Enables auto summarization for the EIGRP process&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  Turns the auto summarization feature of EIGRP off&lt;br /&gt;
&lt;br /&gt;
    ** EIGRP automatically summarizes networks on the classful boundary&lt;br /&gt;
    ** If you have discontigous subnets you could have issues with connectivity if summarization is left on&lt;br /&gt;
    ** If turned off, it is recommended to use the &#039;&#039;&#039;ip summary-address&#039;&#039;&#039; command to summarize manually.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface s0/0/0&#039;&#039;&#039;  -  Enters interface configuration mode&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth 256&#039;&#039;&#039;  -  Sets the bandwidth of this interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    ** You can verify configurations by running the show commands at the Router# prompt&lt;br /&gt;
    ** Show ip protocol, show ip route, sshow ip eigrp interfaces, show ip eigrp toploogy, show ip eigrp neighbors&lt;br /&gt;
    ** show ip eigrp neighbors detail, show ip eigrp traffic, show ip route eigrp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp fsm&#039;&#039;&#039;  -  Displays events and actions related to EIGRP feasible successor metrics (FSM)&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp neighbor&#039;&#039;&#039;  -  Displays events and actions related to EIGRP neighbors. Also &#039;&#039;&#039;debug ip eigrp neighbor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip eigrp notifications&#039;&#039;&#039;  -  Displays EIGRP event notification&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commands for OSPF==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router ospf 456&#039;&#039;&#039;  -  Enables OSPF process. The number &amp;quot;456&amp;quot; is any positive number between 1 and 65, 535.  It is not related to the OSPF area. The process ID is use to distinguish one process from another within the device. These numbers DO NOT have to match the process ID of an other router.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;172.10.0.0 0.0.0.255 area 0&#039;&#039;  - OSPF advertises interfaces, not networks.  It also uses the wildcard mask to determine whch interfaces to advertise.  It is read as &amp;quot;any interface with the address of 172.10.0.0 is to be put in area 0.&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip address x.x.x.x x.x.x.x&#039;&#039;&#039;  -  Assigns IP address to interface&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;router-id 10.1.1.1&#039;&#039;&#039;&#039;&#039;  -  Sets ID to 10.1.1.1 Takes affect at next reload.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no router-id 10..1.1.1&#039;&#039;&#039;  -  Removes the static router ID from the configuration.  Takes affect at next reload.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface S0/0 - Changes interface to be configured&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf priority 50&#039;&#039;&#039;  -  Changes the OSPF interface priority to 50.  The assigned priority can be between 0 and 255. The higher the number the higher the priority.  A 255 guarantees a tie in the election for DR/BDR. Ties are broken by the highest router ID.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface s0/0/0&#039;&#039;&#039;  -  Changes to interface config mode&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth 128&#039;&#039;&#039;  -  If changed, OSPF will recalculate the cost of the link.&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf hello-interval timer 20&#039;&#039;&#039;  -  Changes the hello interval to 20 seconds&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf dead-interval 80&#039;&#039;&#039;  -  Changes the dead interval to 80 seconds&lt;br /&gt;
&lt;br /&gt;
  ** Hello and Dead Timers must match for routers to become neighbors&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;ip route 0.0.0.0 0.0.0.0.0 s0/0&#039;&#039;&#039;  -  Creates a default route&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;default-information originate&#039;&#039;&#039;  -  Sets the default route to be advertised to all OSPF routers&lt;br /&gt;
&lt;br /&gt;
    ** You can verify configurations by running the show commands at the Router# prompt&lt;br /&gt;
    ** Show ip protocol, show ip route, show ip ospf, show ip ospf interface, show ip ospf border-routers, show ip ospf neighbor&lt;br /&gt;
    ** show ip ospf neighbor detail, show ip ospf database, show ip ospf database nssa-external&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip route *&#039;&#039;&#039;  -  Clears entire table forcing it to rebuild&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip route a.b.c.d&#039;&#039;&#039;  -  Clears specific route to network a.b.c.d&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip ospf counters&#039;&#039;&#039;  -  Resets OSPF counters&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip ospf process&#039;&#039;&#039;  -  Clears entire OSPF process forcing it to re-create neighbors, database, and routing table&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf events&#039;&#039;&#039;  -  Displays all OSPF events&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf adjacency&#039;&#039;&#039;  -  Displays various OSPF states and DR/BDR election between adjacent routers&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf packets&#039;&#039;&#039;  -  Displays OSPF packets&lt;br /&gt;
&lt;br /&gt;
  **  ALL INFORMATION PROVIDED ON PAGE IS CONDENSED FROM &amp;quot;CCNA Portable Command Guide&amp;quot;, by Scott Empson, cicsopress.com&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Routing_Protocol_Features_and_Commands&amp;diff=4719</id>
		<title>Routing Protocol Features and Commands</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Routing_Protocol_Features_and_Commands&amp;diff=4719"/>
		<updated>2011-10-12T17:21:13Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |- ! &amp;#039;&amp;#039;&amp;#039;Route Protocol&amp;#039;&amp;#039;&amp;#039; ! &amp;#039;&amp;#039;&amp;#039;Builds Topology Map&amp;#039;&amp;#039;&amp;#039; ! &amp;#039;&amp;#039;&amp;#039;Router can independently &amp;#039;&amp;#039;&amp;#039; &amp;#039;&amp;#039;&amp;#039;determine the shortest path &amp;#039;&amp;#039;&amp;#039; &amp;#039;&amp;#039;&amp;#039;to every network&amp;#039;&amp;#039;&amp;#039; ! &amp;#039;&amp;#039;&amp;#039;Conver...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! &#039;&#039;&#039;Route Protocol&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Builds Topology Map&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Router can independently &#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;determine the shortest path &#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;to every network&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Convergence&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;A periodic/event driven routing updates&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Use of LSP&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;Distance Vector&#039;&#039;&#039;&lt;br /&gt;
| No&lt;br /&gt;
| No&lt;br /&gt;
| Slow&lt;br /&gt;
| Generally no&lt;br /&gt;
| no&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;Link-state&#039;&#039;&#039;&lt;br /&gt;
| Yes&lt;br /&gt;
| Yes&lt;br /&gt;
| Fast&lt;br /&gt;
| Generally yes&lt;br /&gt;
| Yes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
** Information taken from in-class presentation.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! &#039;&#039;&#039;Name&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Class&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Type&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Interior/Exterior&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Default Metric&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Administrative&#039;&#039;&#039; &lt;br /&gt;
&#039;&#039;&#039;Distance&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Hop Count Limit&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Convergance&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Classful/&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Classless&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Update Timers&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Updates&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;VLSM Support&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Algorithm&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Update Address&#039;&#039;&#039;&lt;br /&gt;
! &#039;&#039;&#039;Protocol and Port&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;RIPv1&#039;&#039;&#039;&lt;br /&gt;
| Distance Vector&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Hopcount&lt;br /&gt;
| 120&lt;br /&gt;
| 15&lt;br /&gt;
| Slow&lt;br /&gt;
| Classful&lt;br /&gt;
| 30 Seconds&lt;br /&gt;
| Full Table&lt;br /&gt;
| No&lt;br /&gt;
| Bellman-Ford&lt;br /&gt;
| Broadcast&lt;br /&gt;
| UDP port 520&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;RIPv2&#039;&#039;&#039;&lt;br /&gt;
| Distance Vector&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Hopcount&lt;br /&gt;
| 120&lt;br /&gt;
| 15&lt;br /&gt;
| Slow&lt;br /&gt;
| Classless&lt;br /&gt;
| 30 Seconds&lt;br /&gt;
| Full Table&lt;br /&gt;
| Yes&lt;br /&gt;
| Bellam-Ford&lt;br /&gt;
| 224.0.0.9&lt;br /&gt;
| UDP port 520&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;IGRP&#039;&#039;&#039;&lt;br /&gt;
| Distance Vector&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Bandwidth/Delay&lt;br /&gt;
| 100&lt;br /&gt;
| 255 (100 default)&lt;br /&gt;
| Slow&lt;br /&gt;
| Classful&lt;br /&gt;
| 90 seconds&lt;br /&gt;
| Full Table&lt;br /&gt;
| No&lt;br /&gt;
| Bellman-Ford&lt;br /&gt;
| 224.0.0.10&lt;br /&gt;
| IP Protocol 9&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;EIGRP&#039;&#039;&#039;&lt;br /&gt;
| Hybrid (Advanced Distance Vector)&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Bandwidth/Delay&lt;br /&gt;
| 90 (Internal)&lt;br /&gt;
170 (External)&lt;br /&gt;
| 224 (100 default)&lt;br /&gt;
| Very Fast&lt;br /&gt;
| Classless&lt;br /&gt;
| Only when change occurs&lt;br /&gt;
| Only Changes&lt;br /&gt;
| Yes&lt;br /&gt;
| DUAL&lt;br /&gt;
| 224.0.0.10&lt;br /&gt;
| IP Protocol port 88&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;OSPF&#039;&#039;&#039;&lt;br /&gt;
| Link-state&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Cost&lt;br /&gt;
| 110&lt;br /&gt;
| None&lt;br /&gt;
| Fast&lt;br /&gt;
| Classless&lt;br /&gt;
| Only when changes occur (LSA table is refreshed every 30 minutes, however)&lt;br /&gt;
| Only Changes&lt;br /&gt;
| Yes&lt;br /&gt;
| Dijkstra (SPF)&lt;br /&gt;
| 224.0.0.5 (All SPF Routers)&lt;br /&gt;
224.0.0.6 (DR&#039;s and DBR&#039;s)&lt;br /&gt;
| IP Protocol 89&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;IS-IS&#039;&#039;&#039;&lt;br /&gt;
| Link-state&lt;br /&gt;
| IGP&lt;br /&gt;
| Interior&lt;br /&gt;
| Cost&lt;br /&gt;
| 115&lt;br /&gt;
| None&lt;br /&gt;
| Fast&lt;br /&gt;
| Classless&lt;br /&gt;
| Only when changes occur&lt;br /&gt;
| Only changes&lt;br /&gt;
| Yes&lt;br /&gt;
| Dijkstra (SPF)&lt;br /&gt;
| N/A&lt;br /&gt;
| N/A&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;&#039;BGP&#039;&#039;&#039;&lt;br /&gt;
| Path Vector&lt;br /&gt;
| EGP&lt;br /&gt;
| Exterior&lt;br /&gt;
| Multiple Attributes&lt;br /&gt;
| 20 (External)&lt;br /&gt;
200(Internal)&lt;br /&gt;
| EBGP Neighbors: 1 (Default)&lt;br /&gt;
IBGP Neighbors: None&lt;br /&gt;
| Average&lt;br /&gt;
| Yes&lt;br /&gt;
| Only when changes occur&lt;br /&gt;
| Only changes&lt;br /&gt;
| Yes&lt;br /&gt;
| Best Path Algorithm&lt;br /&gt;
| Unicast&lt;br /&gt;
| TCP port 179&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
      ** Information condensed from http://www.routeralley.com/ra/docs/routing_protocol_comparison.pdf and http://globalconfig.net/ccna-corner/1147/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Network.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Commands for RIP ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router rip&#039;&#039;&#039;  -  Enables RIP as a protocol&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router rip&#039;&#039;&#039;  -  Turns off RIP&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes network&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;version 2&#039;&#039;&#039;  -  Turns on V2 and now RIP will send and receive RIPv2 Packets&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;version 1&#039;&#039;&#039;  -  RIP will send and receive RIPv1 Packets&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  RipV2 summarizes networks at the classful boundary.  This command will turns auto summary off&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;passive-interface s/0/0/1&#039;&#039;&#039;  -  RIP updates will not be sent out this interface&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;neighbor a.b.c.d&#039;&#039;&#039;  -  Defines a specific neighbor to exchange information with&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no ip split-horizon&#039;&#039;&#039;  -  Turns off split horizon (this is on by default)&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;ip split-horizon&#039;&#039;&#039;  -  Turns it back on&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;timers basic 30 60 90 180 270 360&#039;&#039;&#039;  -  Changes timers in RIP: 30=Update timer, 90=Invalid Timer, 180=Hold down timer, 270= Flush timer, 360=Sleep timer&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;default-information originate&#039;&#039;&#039;  -  Generates a default route into RIP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    ** You can verify configurations by running the show commands at the Router# prompt&lt;br /&gt;
    ** Show ip protocol, show ip route, show ip interface brief&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip rip&#039;&#039;&#039;  -  Displays all RIP activity in real time&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;show ip rip database&#039;&#039;&#039;  -  Displays contents of the RIP database&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commands for EIGRP ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router eigrp 100&#039;&#039;&#039;  -  Enables EIGRP as a process. The number &amp;quot;100&amp;quot; is an autonomous system number (ASN) which can be any number between 1 and 65,535. All routers in the same system must use the same ASN&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router eigrp 100&#039;&#039;&#039;  -  Removes EIGRP as a process.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes advertised network&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth &#039;&#039;X&#039;&#039;&#039;&#039;&#039;  -  Sets the bandwidth of this interface to X kilobits to allow EIGRP to make the best metric calculation&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network 1.1.1.1 0.0.0.3&#039;&#039;&#039;  -  Tells which interface or network to include in EIGRP.  Interfaces are configured with addresses that fall within the wildcard mask range of the network statement.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;auto-summary&#039;&#039;&#039;  -  Enables auto summarization for the EIGRP process&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  Turns the auto summarization feature of EIGRP off&lt;br /&gt;
&lt;br /&gt;
    ** EIGRP automatically summarizes networks on the classful boundary&lt;br /&gt;
    ** If you have discontigous subnets you could have issues with connectivity if summarization is left on&lt;br /&gt;
    ** If turned off, it is recommended to use the &#039;&#039;&#039;ip summary-address&#039;&#039;&#039; command to summarize manually.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface s0/0/0&#039;&#039;&#039;  -  Enters interface configuration mode&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth 256&#039;&#039;&#039;  -  Sets the bandwidth of this interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    ** You can verify configurations by running the show commands at the Router# prompt&lt;br /&gt;
    ** Show ip protocol, show ip route, sshow ip eigrp interfaces, show ip eigrp toploogy, show ip eigrp neighbors&lt;br /&gt;
    ** show ip eigrp neighbors detail, show ip eigrp traffic, show ip route eigrp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp fsm&#039;&#039;&#039;  -  Displays events and actions related to EIGRP feasible successor metrics (FSM)&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp neighbor&#039;&#039;&#039;  -  Displays events and actions related to EIGRP neighbors. Also &#039;&#039;&#039;debug ip eigrp neighbor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip eigrp notifications&#039;&#039;&#039;  -  Displays EIGRP event notification&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commands for OSPF==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router ospf 456&#039;&#039;&#039;  -  Enables OSPF process. The number &amp;quot;456&amp;quot; is any positive number between 1 and 65, 535.  It is not related to the OSPF area. The process ID is use to distinguish one process from another within the device. These numbers DO NOT have to match the process ID of an other router.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;172.10.0.0 0.0.0.255 area 0&#039;&#039;  - OSPF advertises interfaces, not networks.  It also uses the wildcard mask to determine whch interfaces to advertise.  It is read as &amp;quot;any interface with the address of 172.10.0.0 is to be put in area 0.&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip address x.x.x.x x.x.x.x&#039;&#039;&#039;  -  Assigns IP address to interface&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;router-id 10.1.1.1&#039;&#039;&#039;&#039;&#039;  -  Sets ID to 10.1.1.1 Takes affect at next reload.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no router-id 10..1.1.1&#039;&#039;&#039;  -  Removes the static router ID from the configuration.  Takes affect at next reload.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface S0/0 - Changes interface to be configured&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf priority 50&#039;&#039;&#039;  -  Changes the OSPF interface priority to 50.  The assigned priority can be between 0 and 255. The higher the number the higher the priority.  A 255 guarantees a tie in the election for DR/BDR. Ties are broken by the highest router ID.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface s0/0/0&#039;&#039;&#039;  -  Changes to interface config mode&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth 128&#039;&#039;&#039;  -  If changed, OSPF will recalculate the cost of the link.&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf hello-interval timer 20&#039;&#039;&#039;  -  Changes the hello interval to 20 seconds&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf dead-interval 80&#039;&#039;&#039;  -  Changes the dead interval to 80 seconds&lt;br /&gt;
&lt;br /&gt;
  ** Hello and Dead Timers must match for routers to become neighbors&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;ip route 0.0.0.0 0.0.0.0.0 s0/0&#039;&#039;&#039;  -  Creates a default route&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;default-information originate&#039;&#039;&#039;  -  Sets the default route to be advertised to all OSPF routers&lt;br /&gt;
&lt;br /&gt;
    ** You can verify configurations by running the show commands at the Router# prompt&lt;br /&gt;
    ** Show ip protocol, show ip route, show ip ospf, show ip ospf interface, show ip ospf border-routers, show ip ospf neighbor&lt;br /&gt;
    ** show ip ospf neighbor detail, show ip ospf database, show ip ospf database nssa-external&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip route *&#039;&#039;&#039;  -  Clears entire table forcing it to rebuild&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip route a.b.c.d&#039;&#039;&#039;  -  Clears specific route to network a.b.c.d&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip ospf counters&#039;&#039;&#039;  -  Resets OSPF counters&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip ospf process&#039;&#039;&#039;  -  Clears entire OSPF process forcing it to re-create neighbors, database, and routing table&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf events&#039;&#039;&#039;  -  Displays all OSPF events&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf adjacency&#039;&#039;&#039;  -  Displays various OSPF states and DR/BDR election between adjacent routers&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf packets&#039;&#039;&#039;  -  Displays OSPF packets&lt;br /&gt;
&lt;br /&gt;
  **  ALL INFORMATION PROVIDED ON PAGE IS CONDENSED FROM &amp;quot;CCNA Portable Command Guide&amp;quot;, by Scott Empson, cicsopress.com&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Routing_Protocol_Commands&amp;diff=4706</id>
		<title>Routing Protocol Commands</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Routing_Protocol_Commands&amp;diff=4706"/>
		<updated>2011-10-09T21:10:07Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Network.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Commands for RIP ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router rip&#039;&#039;&#039;  -  Enables RIP as a protocol&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router rip&#039;&#039;&#039;  -  Turns off RIP&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes network&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;version 2&#039;&#039;&#039;  -  Turns on V2 and now RIP will send and receive RIPv2 Packets&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;version 1&#039;&#039;&#039;  -  RIP will send and receive RIPv1 Packets&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  RipV2 summarizes networks at the classful boundary.  This command will turns auto summary off&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;passive-interface s/0/0/1&#039;&#039;&#039;  -  RIP updates will not be sent out this interface&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;neighbor a.b.c.d&#039;&#039;&#039;  -  Defines a specific neighbor to exchange information with&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no ip split-horizon&#039;&#039;&#039;  -  Turns off split horizon (this is on by default)&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;ip split-horizon&#039;&#039;&#039;  -  Turns it back on&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;timers basic 30 60 90 180 270 360&#039;&#039;&#039;  -  Changes timers in RIP: 30=Update timer, 90=Invalid Timer, 180=Hold down timer, 270= Flush timer, 360=Sleep timer&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;default-information originate&#039;&#039;&#039;  -  Generates a default route into RIP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    ** You can verify configurations by running the show commands at the Router# prompt&lt;br /&gt;
    ** Show ip protocol, show ip route, show ip interface brief&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip rip&#039;&#039;&#039;  -  Displays all RIP activity in real time&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;show ip rip database&#039;&#039;&#039;  -  Displays contents of the RIP database&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commands for EIGRP ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router eigrp 100&#039;&#039;&#039;  -  Enables EIGRP as a process. The number &amp;quot;100&amp;quot; is an autonomous system number (ASN) which can be any number between 1 and 65,535. All routers in the same system must use the same ASN&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router eigrp 100&#039;&#039;&#039;  -  Removes EIGRP as a process.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes advertised network&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth &#039;&#039;X&#039;&#039;&#039;&#039;&#039;  -  Sets the bandwidth of this interface to X kilobits to allow EIGRP to make the best metric calculation&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network 1.1.1.1 0.0.0.3&#039;&#039;&#039;  -  Tells which interface or network to include in EIGRP.  Interfaces are configured with addresses that fall within the wildcard mask range of the network statement.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;auto-summary&#039;&#039;&#039;  -  Enables auto summarization for the EIGRP process&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  Turns the auto summarization feature of EIGRP off&lt;br /&gt;
&lt;br /&gt;
    ** EIGRP automatically summarizes networks on the classful boundary&lt;br /&gt;
    ** If you have discontigous subnets you could have issues with connectivity if summarization is left on&lt;br /&gt;
    ** If turned off, it is recommended to use the &#039;&#039;&#039;ip summary-address&#039;&#039;&#039; command to summarize manually.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface s0/0/0&#039;&#039;&#039;  -  Enters interface configuration mode&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth 256&#039;&#039;&#039;  -  Sets the bandwidth of this interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    ** You can verify configurations by running the show commands at the Router# prompt&lt;br /&gt;
    ** Show ip protocol, show ip route, sshow ip eigrp interfaces, show ip eigrp toploogy, show ip eigrp neighbors&lt;br /&gt;
    ** show ip eigrp neighbors detail, show ip eigrp traffic, show ip route eigrp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp fsm&#039;&#039;&#039;  -  Displays events and actions related to EIGRP feasible successor metrics (FSM)&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp neighbor&#039;&#039;&#039;  -  Displays events and actions related to EIGRP neighbors. Also &#039;&#039;&#039;debug ip eigrp neighbor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip eigrp notifications&#039;&#039;&#039;  -  Displays EIGRP event notification&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commands for OSPF==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router ospf 456&#039;&#039;&#039;  -  Enables OSPF process. The number &amp;quot;456&amp;quot; is any positive number between 1 and 65, 535.  It is not related to the OSPF area. The process ID is use to distinguish one process from another within the device. These numbers DO NOT have to match the process ID of an other router.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;172.10.0.0 0.0.0.255 area 0&#039;&#039;  - OSPF advertises interfaces, not networks.  It also uses the wildcard mask to determine whch interfaces to advertise.  It is read as &amp;quot;any interface with the address of 172.10.0.0 is to be put in area 0.&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip address x.x.x.x x.x.x.x&#039;&#039;&#039;  -  Assigns IP address to interface&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;router-id 10.1.1.1&#039;&#039;&#039;&#039;&#039;  -  Sets ID to 10.1.1.1 Takes affect at next reload.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no router-id 10..1.1.1&#039;&#039;&#039;  -  Removes the static router ID from the configuration.  Takes affect at next reload.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface S0/0 - Changes interface to be configured&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf priority 50&#039;&#039;&#039;  -  Changes the OSPF interface priority to 50.  The assigned priority can be between 0 and 255. The higher the number the higher the priority.  A 255 guarantees a tie in the election for DR/BDR. Ties are broken by the highest router ID.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface s0/0/0&#039;&#039;&#039;  -  Changes to interface config mode&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth 128&#039;&#039;&#039;  -  If changed, OSPF will recalculate the cost of the link.&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf hello-interval timer 20&#039;&#039;&#039;  -  Changes the hello interval to 20 seconds&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf dead-interval 80&#039;&#039;&#039;  -  Changes the dead interval to 80 seconds&lt;br /&gt;
&lt;br /&gt;
  ** Hello and Dead Timers must match for routers to become neighbors&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;ip route 0.0.0.0 0.0.0.0.0 s0/0&#039;&#039;&#039;  -  Creates a default route&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;default-information originate&#039;&#039;&#039;  -  Sets the default route to be advertised to all OSPF routers&lt;br /&gt;
&lt;br /&gt;
    ** You can verify configurations by running the show commands at the Router# prompt&lt;br /&gt;
    ** Show ip protocol, show ip route, show ip ospf, show ip ospf interface, show ip ospf border-routers, show ip ospf neighbor&lt;br /&gt;
    ** show ip ospf neighbor detail, show ip ospf database, show ip ospf database nssa-external&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip route *&#039;&#039;&#039;  -  Clears entire table forcing it to rebuild&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip route a.b.c.d&#039;&#039;&#039;  -  Clears specific route to network a.b.c.d&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip ospf counters&#039;&#039;&#039;  -  Resets OSPF counters&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip ospf process&#039;&#039;&#039;  -  Clears entire OSPF process forcing it to re-create neighbors, database, and routing table&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf events&#039;&#039;&#039;  -  Displays all OSPF events&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf adjacency&#039;&#039;&#039;  -  Displays various OSPF states and DR/BDR election between adjacent routers&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf packets&#039;&#039;&#039;  -  Displays OSPF packets&lt;br /&gt;
&lt;br /&gt;
  **  ALL INFORMATION PROVIDED ON PAGE IS CONDENSED FROM &amp;quot;CCNA Portable Command Guide&amp;quot;, by Scott Empson, cicsopress.com&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Routing_Protocol_Commands&amp;diff=4705</id>
		<title>Routing Protocol Commands</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Routing_Protocol_Commands&amp;diff=4705"/>
		<updated>2011-10-09T21:02:53Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Network.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Commands for RIP ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router rip&#039;&#039;&#039;  -  Enables RIP as a protocol&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router rip&#039;&#039;&#039;  -  Turns off RIP&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes network&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;version 2&#039;&#039;&#039;  -  Turns on V2 and now RIP will send and receive RIPv2 Packets&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;version 1&#039;&#039;&#039;  -  RIP will send and receive RIPv1 Packets&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  RipV2 summarizes networks at the classful boundary.  This command will turns auto summary off&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;passive-interface s/0/0/1&#039;&#039;&#039;  -  RIP updates will not be sent out this interface&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;neighbor a.b.c.d&#039;&#039;&#039;  -  Defines a specific neighbor to exchange information with&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no ip split-horizon&#039;&#039;&#039;  -  Turns off split horizon (this is on by default)&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;ip split-horizon&#039;&#039;&#039;  -  Turns it back on&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;timers basic 30 60 90 180 270 360&#039;&#039;&#039;  -  Changes timers in RIP: 30=Update timer, 90=Invalid Timer, 180=Hold down timer, 270= Flush timer, 360=Sleep timer&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;default-information originate&#039;&#039;&#039;  -  Generates a default route into RIP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip rip&#039;&#039;&#039;  -  Displays all RIP activity in real time&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;show ip rip database&#039;&#039;&#039;  -  Displays contents of the RIP database&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commands for EIGRP ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router eigrp 100&#039;&#039;&#039;  -  Enables EIGRP as a process. The number &amp;quot;100&amp;quot; is an autonomous system number (ASN) which can be any number between 1 and 65,535. All routers in the same system must use the same ASN&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router eigrp 100&#039;&#039;&#039;  -  Removes EIGRP as a process.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes advertised network&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth &#039;&#039;X&#039;&#039;&#039;&#039;&#039;  -  Sets the bandwidth of this interface to X kilobits to allow EIGRP to make the best metric calculation&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network 1.1.1.1 0.0.0.3&#039;&#039;&#039;  -  Tells which interface or network to include in EIGRP.  Interfaces are configured with addresses that fall within the wildcard mask range of the network statement.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;auto-summary&#039;&#039;&#039;  -  Enables auto summarization for the EIGRP process&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  Turns the auto summarization feature of EIGRP off&lt;br /&gt;
&lt;br /&gt;
    ** EIGRP automatically summarizes networks on the classful boundary.&lt;br /&gt;
&lt;br /&gt;
    ** If you have discontigous subnets you could have issues with connectivity if summarization is left on.&lt;br /&gt;
&lt;br /&gt;
    ** If turned off, it is recommended to use the &#039;&#039;&#039;ip summary-address&#039;&#039;&#039; command to summarize manually.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface s0/0/0&#039;&#039;&#039;  -  Enters interface configuration mode&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth 256&#039;&#039;&#039;  -  Sets the bandwidth of this interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp fsm&#039;&#039;&#039;  -  Displays events and actions related to EIGRP feasible successor metrics (FSM)&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp neighbor&#039;&#039;&#039;  -  Displays events and actions related to EIGRP neighbors. Also &#039;&#039;&#039;debug ip eigrp neighbor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip eigrp notifications&#039;&#039;&#039;  -  Displays EIGRP event notification&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commands for OSPF==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router ospf 456&#039;&#039;&#039;  -  Enables OSPF process. The number &amp;quot;456&amp;quot; is any positive number between 1 and 65, 535.  It is not related to the OSPF area. The process ID is use to distinguish one process from another within the device. These numbers DO NOT have to match the process ID of an other router.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;172.10.0.0 0.0.0.255 area 0&#039;&#039;  - OSPF advertises interfaces, not networks.  It also uses the wildcard mask to determine whch interfaces to advertise.  It is read as &amp;quot;any interface with the address of 172.10.0.0 is to be put in area 0.&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip address x.x.x.x x.x.x.x&#039;&#039;&#039;  -  Assigns IP address to interface&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;router-id 10.1.1.1&#039;&#039;&#039;&#039;&#039;  -  Sets ID to 10.1.1.1 Takes affect at next reload.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no router-id 10..1.1.1&#039;&#039;&#039;  -  Removes the static router ID from the configuration.  Takes affect at next reload.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface S0/0 - Changes interface to be configured&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf priority 50&#039;&#039;&#039;  -  Changes the OSPF interface priority to 50.  The assigned priority can be between 0 and 255. The higher the number the higher the priority.  A 255 guarantees a tie in the election for DR/BDR. Ties are broken by the highest router ID.&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface s0/0/0&#039;&#039;&#039;  -  Changes to interface config mode&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth 128&#039;&#039;&#039;  -  If changed, OSPF will recalculate the cost of the link.&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf hello-interval timer 20&#039;&#039;&#039;  -  Changes the hello interval to 20 seconds&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;ip ospf dead-interval 80&#039;&#039;&#039;  -  Changes the dead interval to 80 seconds&lt;br /&gt;
&lt;br /&gt;
  ** Hello and Dead Timers must match for routers to become neighbors&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;ip route 0.0.0.0 0.0.0.0.0 s0/0&#039;&#039;&#039;  -  Creates a default route&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;default-information originate&#039;&#039;&#039;  -  Sets the default route to be advertised to all OSPF routers&lt;br /&gt;
&lt;br /&gt;
    ** You can verify configurations by running the show commands at the Router# prompt&lt;br /&gt;
    ** Show ip protocol, show ip route, show ip ospf, show ip ospf interface, show ip ospf border-routers, show ip ospf neighbor&lt;br /&gt;
    ** show ip ospf neighbor detail, show ip ospf database, show ip ospf database nssa-external&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip route *&#039;&#039;&#039;  -  Clears entire table forcing it to rebuild&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip route a.b.c.d&#039;&#039;&#039;  -  Clears specific route to network a.b.c.d&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip ospf counters&#039;&#039;&#039;  -  Resets OSPF counters&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;clear ip ospf process&#039;&#039;&#039;  -  Clears entire OSPF process forcing it to re-create neighbors, database, and routing table&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf events&#039;&#039;&#039;  -  Displays all OSPF events&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf adjacency&#039;&#039;&#039;  -  Displays various OSPF states and DR/BDR election between adjacent routers&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip ospf packets&#039;&#039;&#039;  -  Displays OSPF packets&lt;br /&gt;
&lt;br /&gt;
  **  ALL INFORMATION PROVIDED ON PAGE IS FROM CCNA Portable Command Guide, Scott Empson, cicsopress.com&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Routing_Protocol_Commands&amp;diff=4703</id>
		<title>Routing Protocol Commands</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Routing_Protocol_Commands&amp;diff=4703"/>
		<updated>2011-10-09T20:20:54Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: Created page with &amp;quot;Image:Network.jpg  == Commands for RIP ==    Router(config)#&amp;#039;&amp;#039;&amp;#039;router rip&amp;#039;&amp;#039;&amp;#039;  -  Enables RIP as a protocol  Router(config-router)#&amp;#039;&amp;#039;&amp;#039;network&amp;#039;&amp;#039;&amp;#039; &amp;#039;&amp;#039;w.x.y.z&amp;#039;&amp;#039;  - &amp;#039;&amp;#039;w.x.y.z&amp;#039;&amp;#039; is ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Network.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Commands for RIP ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router rip&#039;&#039;&#039;  -  Enables RIP as a protocol&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router rip&#039;&#039;&#039;  -  Turns off RIP&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes network&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;version 2&#039;&#039;&#039;  -  Turns on V2 and now RIP will send and receive RIPv2 Packets&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;version 1&#039;&#039;&#039;  -  RIP will send and receive RIPv1 Packets&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  RipV2 summarizes networks at the classful boundary.  This command will turns auto summary off&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;passive-interface s/0/0/1&#039;&#039;&#039;  -  RIP updates will not be sent out this interface&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;neighbor a.b.c.d&#039;&#039;&#039;  -  Defines a specific neighbor to exchange information with&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no ip split-horizon&#039;&#039;&#039;  -  Turns off split horizon (this is on by default)&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;ip split-horizon&#039;&#039;&#039;  -  Turns it back on&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;timers basic 30 60 90 180 270 360&#039;&#039;&#039;  -  Changes timers in RIP: 30=Update timer, 90=Invalid Timer, 180=Hold down timer, 270= Flush timer, 360=Sleep timer&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;default-information originate&#039;&#039;&#039;  -  Generates a default route into RIP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip rip&#039;&#039;&#039;  -  Displays all RIP activity in real time&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;show ip rip database&#039;&#039;&#039;  -  Displays contents of the RIP database&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commands for EIGRP ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router eigrp 100&#039;&#039;&#039;  -  Enables EIGRP as a process. The number &amp;quot;100&amp;quot; is an autonomous system number (ASN) which can be any number between 1 and 65,535. All routers in the same system must use the same ASN&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router eigrp 100&#039;&#039;&#039;  -  Removes EIGRP as a process.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes advertised network&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth &#039;&#039;X&#039;&#039;&#039;&#039;&#039;  -  Sets the bandwidth of this interface to X kilobits to allow EIGRP to make the best metric calculation&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network 1.1.1.1 0.0.0.3&#039;&#039;&#039;  -  Tells which interface or network to include in EIGRP.  Interfaces are configured with addresses that fall within the wildcard mask range of the network statement.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;auto-summary&#039;&#039;&#039;  -  Enables auto summarization for the EIGRP process&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  Turns the auto summarization feature of EIGRP off&lt;br /&gt;
&lt;br /&gt;
    ** EIGRP automatically summarizes networks on the classful boundary.&lt;br /&gt;
&lt;br /&gt;
    ** If you have discontigous subnets you could have issues with connectivity if summarization is left on.&lt;br /&gt;
&lt;br /&gt;
    ** If turned off, it is recommended to use the &#039;&#039;&#039;ip summary-address&#039;&#039;&#039; command to summarize manually.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface s0/0/0&#039;&#039;&#039;  -  Enters interface configuration mode&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth 256&#039;&#039;&#039;  -  Sets the bandwidth of this interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp fsm&#039;&#039;&#039;  -  Displays events and actions related to EIGRP feasible successor metrics (FSM)&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp neighbor&#039;&#039;&#039;  -  Displays events and actions related to EIGRP neighbors. Also &#039;&#039;&#039;debug ip eigrp neighbor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip eigrp notifications&#039;&#039;&#039;  -  Displays EIGRP event notification&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commands for OSPF==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;router ospf 456&#039;&#039;&#039;  -  Enables OSPF process. The number &amp;quot;456&amp;quot; is any positive number between 1 and 65, 535.  It is not related to the OSPF area. The process ID is use to distinguish one process from another within the device. These numbers DO NOT have to match the process ID of an other router.&lt;br /&gt;
&lt;br /&gt;
_________________________________ STOPPED HERE FOR NOW _____________________________________________________&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;no router eigrp 100&#039;&#039;&#039;  -  Removes EIGRP as a process.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;w.x.y.z&#039;&#039;  - &#039;&#039;w.x.y.z&#039;&#039; is the directly connected network you want to advertise&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no network w.x.y.z&#039;&#039;&#039;  -  Removes advertised network&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth &#039;&#039;X&#039;&#039;&#039;&#039;&#039;  -  Sets the bandwidth of this interface to X kilobits to allow EIGRP to make the best metric calculation&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;network 1.1.1.1 0.0.0.3&#039;&#039;&#039;  -  Tells which interface or network to include in EIGRP.  Interfaces are configured with addresses that fall within the wildcard mask range of the network statement.&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;auto-summary&#039;&#039;&#039;  -  Enables auto summarization for the EIGRP process&lt;br /&gt;
&lt;br /&gt;
Router(config-router)#&#039;&#039;&#039;no auto-summary&#039;&#039;&#039;  -  Turns the auto summarization feature of EIGRP off&lt;br /&gt;
&lt;br /&gt;
    ** EIGRP automatically summarizes networks on the classful boundary.&lt;br /&gt;
&lt;br /&gt;
    ** If you have discontigous subnets you could have issues with connectivity if summarization is left on.&lt;br /&gt;
&lt;br /&gt;
    ** If turned off, it is recommended to use the &#039;&#039;&#039;ip summary-address&#039;&#039;&#039; command to summarize manually.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router(config)#&#039;&#039;&#039;interface s0/0/0&#039;&#039;&#039;  -  Enters interface configuration mode&lt;br /&gt;
&lt;br /&gt;
Router(config-if)#&#039;&#039;&#039;bandwidth 256&#039;&#039;&#039;  -  Sets the bandwidth of this interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Commands for Troubleshooting&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp fsm&#039;&#039;&#039;  -  Displays events and actions related to EIGRP feasible successor metrics (FSM)&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp neighbor&#039;&#039;&#039;  -  Displays events and actions related to EIGRP neighbors. Also &#039;&#039;&#039;debug ip eigrp neighbor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug eigrp packet&#039;&#039;&#039;  -  Displays events and actions related to EIGRP packets&lt;br /&gt;
&lt;br /&gt;
Router#&#039;&#039;&#039;debug ip eigrp notifications&#039;&#039;&#039;  -  Displays EIGRP event notification&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Network.jpg&amp;diff=4702</id>
		<title>File:Network.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Network.jpg&amp;diff=4702"/>
		<updated>2011-10-09T19:21:19Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=4573</id>
		<title>Franske CNT-2311</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=4573"/>
		<updated>2011-07-14T14:42:44Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: /* Chapter Project Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2311 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
=Current Course Materials=&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [https://spreadsheets.google.com/a/ihcnt.net/spreadsheet/viewform?formkey=dF94ODJ2cFZ0WmtTLWluUGFGaUxlcFE6MQ First Day Sign In Form]&lt;br /&gt;
* [[Franske CNT-2311 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2311 SU11 Schedule|Summer 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2311 SU11 Labs|Lab List]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
&lt;br /&gt;
== Unit Notes ==&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [[Writing Moodle Questions]]&lt;br /&gt;
* [[Editing Moodle Questions]]&lt;br /&gt;
&lt;br /&gt;
=== Software ===&lt;br /&gt;
* [http://www.virtualbox.org Virtualbox]&lt;br /&gt;
** [[VirtualBox Startup Script]]&lt;br /&gt;
&lt;br /&gt;
==== Major Linux Distributions ====&lt;br /&gt;
* [http://www.debian.org Debian]&lt;br /&gt;
** [http://www.ubuntu.com Ubuntu]&lt;br /&gt;
* [http://www.redhat.com Redhat Enterprise Linux (RHEL)]&lt;br /&gt;
** [http://centos.org CentOS]&lt;br /&gt;
** [http://fedoraproject.org Fedora]&lt;br /&gt;
* [http://www.gentoo.org Gentoo]&lt;br /&gt;
* [http://www.opensuse.org OpenSUSE (Novell)]&lt;br /&gt;
&lt;br /&gt;
=== General Help ===&lt;br /&gt;
==== Online Linux Tutuorials ====&lt;br /&gt;
* [http://www.linux.org/lessons/beginner Beginning Linux from Linux.org]&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixBasicSetupHowto Postfix Basic Setup]&lt;br /&gt;
* [http://lartc.org Linux Advanced Routing &amp;amp; Traffic Control (Advanced Networking)]&lt;br /&gt;
&lt;br /&gt;
=== Command Guides ===&lt;br /&gt;
* [http://vic.gedris.org/Manual-ShellIntro/1.2/ShellIntro.pdf Inroduction to basic BASH shell commands]&lt;br /&gt;
* [http://www.digilife.be/quickreferences/QRC/The%20One%20Page%20Linux%20Manual.pdf The One Page Linux Manual]&lt;br /&gt;
&lt;br /&gt;
=== Specific Topic Help ===&lt;br /&gt;
==== GRUB2 ====&lt;br /&gt;
* [https://help.ubuntu.com/community/Grub2 Ubuntu Community Documentation - GRUB2]&lt;br /&gt;
* [http://www.dedoimedo.com/computers/grub-2.html GRUB2 Bootloader Full Tutorial]&lt;br /&gt;
* [http://ubuntuforums.org/showthread.php?t=1195275 The GRUB2 Guide]&lt;br /&gt;
&lt;br /&gt;
==== Runlevels ====&lt;br /&gt;
* [http://www.ibm.com/developerworks/linux/library/l-lpic1-v3-101-3/?ca=drs- IBM Learn Linux, 101: Runlevels, shutdown, and reboot]&lt;br /&gt;
* [http://www.linux.com/news/enterprise/systems-management/8116-an-introduction-to-services-runlevels-and-rcd-scripts An  introduction to services, runlevels, and rc.d scripts]&lt;br /&gt;
&lt;br /&gt;
==== Partitioning, Formatting and Mounting====&lt;br /&gt;
* [http://tldp.org/HOWTO/Partition/ Linux Partition HOWTO]&lt;br /&gt;
* [http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/4/html/Introduction_To_System_Administration/s2-storage-fs-mounting.html RedHat Documentation Mount Points]&lt;br /&gt;
* [http://docs.fedoraproject.org/en-US/Fedora/15/html/Installation_Guide/ch-partitions-x86.html Fedora Documentation: An Introduction to Disk Partitions]&lt;br /&gt;
&lt;br /&gt;
==== SSH ====&lt;br /&gt;
* [http://macnugget.org/projects/publickeys/ David McNett: using ssh public key authentication]&lt;br /&gt;
* [https://help.ubuntu.com/community/SSH/OpenSSH/Keys Ubuntu SSH Keys Documentation]&lt;br /&gt;
* [http://www.linuxtutorialblog.com/post/ssh-and-scp-howto-tips-tricks Linux Tutorial Blog: SSH and SCP: Howto, tips &amp;amp; tricks]&lt;br /&gt;
&lt;br /&gt;
==== Network Configuration ====&lt;br /&gt;
* [http://www.debian-administration.org/articles/254 Debian-style Network Configuration] (Ubuntu Server uses the same style)&lt;br /&gt;
* [http://docs.fedoraproject.org/en-US/Fedora/15/html/Deployment_Guide/s1-networkscripts-interfaces.html Fedora Nekwork Interface Configuration Files] &lt;br /&gt;
&lt;br /&gt;
==== Regular Expressions, Grep and SED ====&lt;br /&gt;
* [http://www.zytrax.com/tech/web/regex.htm Regular Expressions - A Simple User Guide]&lt;br /&gt;
* [http://linuxreviews.org/beginner/tao_of_regular_expressions Tao of Regular Expressions]&lt;br /&gt;
&lt;br /&gt;
=Archived Course Materials=&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2311 Labs|Lab List]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Project Notes ==&lt;br /&gt;
[[CNT-2311-Chapter 2 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 3 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 4 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 5 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 7 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 8 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 9 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 10 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
[http://wiki.ihcnt.net/w/Chapter_21_%26_24 CNT-2311-Chapter 21 &amp;amp; 24 Notes]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[Dual Booting Ubuntu and Windows 7]]&lt;br /&gt;
* [[GUID Partiton Table]]&lt;br /&gt;
* [[Linux VLAN Trunking]]&lt;br /&gt;
* [[Installing Webmin]]&lt;br /&gt;
* [[Nat Masquerading and Firewall]]&lt;br /&gt;
* [[Control Web Access With Squid]]&lt;br /&gt;
* [[Installing MyBB Forum]]&lt;br /&gt;
* [[openvpn]]&lt;br /&gt;
* [[Zoneminder]]&lt;br /&gt;
* [[Understanding Linux Permission Sets]]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Commands|Spring 2010 Commands by Session]]&lt;br /&gt;
* [[Converting VMWare .vmdk To VirtualBox .vdi Using Qemu+ and VBoxManage]]&lt;br /&gt;
* [[Linux command guide]]&lt;br /&gt;
* [[Windows File Sharing and Printer Sharing with SAMBA]]&lt;br /&gt;
* [[How to Setup NAT]]&lt;br /&gt;
* [[Linux-command-list]]&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4572</id>
		<title>Linux SSH and Samba Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4572"/>
		<updated>2011-07-14T14:34:47Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter 21 Linux Administration: A Beginners Guide&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Shell (SSH)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SSH Basics&#039;&#039;&#039; (Page 479)&lt;br /&gt;
&lt;br /&gt;
Linux supports remote login access through several different servers including Telnet, VNC and even X. They all transfer data over the network in unencrypted form. SSH encrypts the password exchange and all subsequent data transfers. SSH provides file transfer features &amp;amp; the ability to tunnel other network protocols Several SSH servers are available, the most popular is the OpenSSH server OpenSSH can be launched using a super script or with a SysV startup script (preferred) Configuring Basic SSH Features (page 486) The main configuration file for the OpenSSH server is /etc/ssh/sshd_config (page 490) The default settings work for most systems. You might want to check or modify: Protocol Level: Version 2.0 is preferred due to known vulnerabilities in earlier versions. Permit_Root_Login: The default is yes, but this is a security risk. X11_Forwarding: (X tunneling features) The default is no If you make changes to the configuration file, be sure to restart the server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SSH Keys (Page 480)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSH uses a security system that involves two keys: a Private Key and Public Key All parties that engage in an SSH communication have their own keys. These keys are mathematically linked so that data encrypted with a Public Key may only be decrypted with the matching Private Key. On the server, there are normally 4 to 6 keys and they are stored in /etc/ssh If keys are not present, you can generate them with the ssh-keygen command On the client, keys are stored in the ~/.ssh/known_hosts file. You can pre-populate this file on the client to prevent security warnings. &lt;br /&gt;
Some good references are listed on page 483 if you want to delve further into encryption.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SSH Clients (Page 485)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are several clients available for use with SSH.&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
&#039;&#039;&#039;PuTTY&#039;&#039;&#039; is one of the oldest and most popular SSH Clients for Win32 platforms.  It is free and can be downloaded at http://www.chiark.greenend.org.uk/~sgtatham/putty/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;OpenSSH&#039;&#039;&#039; for Mac OS X&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MindTerm&#039;&#039;&#039; This program supports V1 and 2 of SSH.  Written in java it works on many UNIX platforms. http://www.cryptzone.com/products/agmindterm/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;FreeSSH&#039;&#039;&#039; for Windows http://www.freessh.org/ keeps track of programs both free and commercial for SSH clients and implementations.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SecureCRT&#039;&#039;&#039; for windows.  Commercial product. http://www.vandyke.com/products/securecrt/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Copy&#039;&#039;&#039; (SCP) via SSH (page 495) &lt;br /&gt;
&lt;br /&gt;
SSH includes a file-copying command: scp It works like cp but you must specify the target computer You must use a colon at the end of this command to prevent renaming the file&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure FTP&#039;&#039;&#039; (SFTP) (page 495)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Secure FTP is a subsystem of the ssh daemon.  You can access the secure FTP server by using the sftp command line tool.&lt;br /&gt;
Configuring Logins without Passwords&lt;br /&gt;
SSH can be configured to allow logins without passing a password A security risk is if someone gains access to your account on the client, then they have your access to the server. To do this, you must generate a special key pair on the client, transfer the Public Key to the server, and place it in the ~/.ssh/authorized_keys file. &lt;br /&gt;
Setting Up SSH Port Tunnels (page 491) &lt;br /&gt;
SSH has the ability to encrypt other protocols and thus protect them in transit On the server side, must make sure that the /etc/ssh/sshd_config file has the option AllowTCPForwarding set to yes On the client side, you must establish a special SSH connection using the -N, -f, and the -L options.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Chapter 24 Linux Administration: A Beginners Guide&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SAMBA&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Basics&#039;&#039;&#039; (page 548)&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Samba is a suite of applications for allowing UINX based systems to operate with Windows based operating systems.  Samba provides file and print sharing services to Windows clients.  It does this through the use of native Microsoft networking protocols SMB/CIFS. Samba has been ported to many number of platforms including most variants of UNIX and several non-unix environments. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Mechanics&#039;&#039;&#039; (page 548)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Linux password and login mechanism is different from Windows PDC (Primary Domain Controller) model and the Windows Active Directory model.  It is important for system administrators to keep passwords and logins consistent across both platforms.  Relative to Samba there are several options for handling username and password issuers.  &lt;br /&gt;
&lt;br /&gt;
Some of these are:&lt;br /&gt;
  &lt;br /&gt;
&#039;&#039;&#039;The Linux Pluggable Authentication Modules (PAM)&#039;&#039;&#039;.  Allows you to authenticate users against the PDC.  This means you will have 2 users lists, one local and one on the PDC but users only need to remember one.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba as PDC&#039;&#039;&#039; Allows you to keep all logins and passwords on the Linux system while all your windows systems authenticate with Samba.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Roll your own solution using Perl&#039;&#039;&#039; Allows for the use of your own custom script.  This can be done with WinPerl and Perl modules that allow changes to the Security Access manager (SAM) to update PDC’s password list.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Encrypted Passwords&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Windows uses encrypted passwords when communicating with the PDC and any server requiring authentication (including Linux and Samba). The encryption algorithm used by windows is different from UNIX so it is therefore not compatible.  &lt;br /&gt;
&lt;br /&gt;
Your choices in dealing with this are:&lt;br /&gt;
  1. Edit the registry on windows clients to disable the use of encrypted passwords. (As of v3 of Samba, this is no longer necessary)&lt;br /&gt;
  2. Configure Samba to use encrypted passwords.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Daemons&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Samba code is actually composed of  several components.  The book examines three.&lt;br /&gt;
  1. SMBD – handles the actual sharing of file systems and printer services&lt;br /&gt;
  2. NMBD – is responsible for handling NETBIOS name service requests&lt;br /&gt;
  3. WINBINDD – can be used to query native Windows servers for user and group information that can then be used on purely Linux/UNIX platforms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installing and Running Samba&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Can be installed using yum, apt-get, or can be done via source. Once installed Samba can be configured thru the command line.  It can also be configured with Webmin using its GUI interface.&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4571</id>
		<title>Linux SSH and Samba Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4571"/>
		<updated>2011-07-14T14:31:33Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter 21 Linux Administration: A Beginners Guide&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Shell (SSH)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSH Basics (Page 479)&lt;br /&gt;
&lt;br /&gt;
Linux supports remote login access through several different servers including Telnet, VNC and even X. They all transfer data over the network in unencrypted form. SSH encrypts the password exchange and all subsequent data transfers. SSH provides file transfer features &amp;amp; the ability to tunnel other network protocols Several SSH servers are available, the most popular is the OpenSSH server OpenSSH can be launched using a super script or with a SysV startup script (preferred) Configuring Basic SSH Features (page 486) The main configuration file for the OpenSSH server is /etc/ssh/sshd_config (page 490) The default settings work for most systems. You might want to check or modify: Protocol Level: Version 2.0 is preferred due to known vulnerabilities in earlier versions. Permit_Root_Login: The default is yes, but this is a security risk. X11_Forwarding: (X tunneling features) The default is no If you make changes to the configuration file, be sure to restart the server.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Keys (Page 480)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SSH uses a security system that involves two keys: a Private Key and Public Key All parties that engage in an SSH communication have their own keys. These keys are mathematically linked so that data encrypted with a Public Key may only be decrypted with the matching Private Key. On the server, there are normally 4 to 6 keys and they are stored in /etc/ssh If keys are not present, you can generate them with the ssh-keygen command On the client, keys are stored in the ~/.ssh/known_hosts file. You can pre-populate this file on the client to prevent security warnings. &lt;br /&gt;
Some good references are listed on page 483 if you want to delve further into encryption.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SSH Clients (Page 485)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
There are several clients available for use with SSH.&lt;br /&gt;
  &lt;br /&gt;
&#039;&#039;&#039;PuTTY&#039;&#039;&#039; is one of the oldest and most popular SSH Clients for Win32 platforms.  It is free and can be downloaded at http://www.chiark.greenend.org.uk/~sgtatham/putty/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;OpenSSH&#039;&#039;&#039; for Mac OS X&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MindTerm&#039;&#039;&#039; This program supports V1 and 2 of SSH.  Written in java it works on many UNIX platforms. http://www.cryptzone.com/products/agmindterm/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;FreeSSH&#039;&#039;&#039; for Windows http://www.freessh.org/ keeps track of programs both free and commercial for SSH clients and implementations.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SecureCRT&#039;&#039;&#039; for windows.  Commercial product. http://www.vandyke.com/products/securecrt/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Copy&#039;&#039;&#039; (SCP) via SSH (page 495) &lt;br /&gt;
&lt;br /&gt;
SSH includes a file-copying command: scp It works like cp but you must specify the target computer You must use a colon at the end of this command to prevent renaming the file&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure FTP&#039;&#039;&#039; (SFTP) (page 495)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Secure FTP is a subsystem of the ssh daemon.  You can access the secure FTP server by using the sftp command line tool.&lt;br /&gt;
Configuring Logins without Passwords&lt;br /&gt;
SSH can be configured to allow logins without passing a password A security risk is if someone gains access to your account on the client, then they have your access to the server. To do this, you must generate a special key pair on the client, transfer the Public Key to the server, and place it in the ~/.ssh/authorized_keys file. &lt;br /&gt;
Setting Up SSH Port Tunnels (page 491) &lt;br /&gt;
SSH has the ability to encrypt other protocols and thus protect them in transit On the server side, must make sure that the /etc/ssh/sshd_config file has the option AllowTCPForwarding set to yes On the client side, you must establish a special SSH connection using the -N, -f, and the -L options.&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Chapter 24 Linux Administration: A Beginners Guide&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SAMBA&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Basics&#039;&#039;&#039; (page 548)&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Samba is a suite of applications for allowing UINX based systems to operate with Windows based operating systems.  Samba provides file and print sharing services to Windows clients.  It does this through the use of native Microsoft networking protocols SMB/CIFS. Samba has been ported to many number of platforms including most variants of UNIX and several non-unix environments. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Mechanics&#039;&#039;&#039; (page 548)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Linux password and login mechanism is different from Windows PDC (Primary Domain Controller) model and the Windows Active Directory model.  It is important for system administrators to keep passwords and logins consistent across both platforms.  Relative to Samba there are several options for handling username and password issuers.  &lt;br /&gt;
&lt;br /&gt;
Some of these are:&lt;br /&gt;
  &lt;br /&gt;
&#039;&#039;&#039;The Linux Pluggable Authentication Modules (PAM)&#039;&#039;&#039;.  Allows you to authenticate users against the PDC.  This means you will have 2 users lists, one local and one on the PDC but users only need to remember one.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba as PDC&#039;&#039;&#039; Allows you to keep all logins and passwords on the Linux system while all your windows systems authenticate with Samba.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Roll your own solution using Perl&#039;&#039;&#039; Allows for the use of your own custom script.  This can be done with WinPerl and Perl modules that allow changes to the Security Access manager (SAM) to update PDC’s password list.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Encrypted Passwords&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Windows uses encrypted passwords when communicating with the PDC and any server requiring authentication (including Linux and Samba). The encryption algorithm used by windows is different from UNIX so it is therefore not compatible.  &lt;br /&gt;
&lt;br /&gt;
Your choices in dealing with this are:&lt;br /&gt;
  1. Edit the registry on windows clients to disable the use of encrypted passwords. (As of v3 of Samba, this is no longer necessary)&lt;br /&gt;
  2. Configure Samba to use encrypted passwords.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Daemons&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Samba code is actually composed of  several components.  The book examines three.&lt;br /&gt;
  1. SMBD – handles the actual sharing of file systems and printer services&lt;br /&gt;
  2. NMBD – is responsible for handling NETBIOS name service requests&lt;br /&gt;
  3. WINBINDD – can be used to query native Windows servers for user and group information that can then be used on purely Linux/UNIX platforms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installing and Running Samba&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Can be installed using yum, apt-get, or can be done via source. Once installed Samba can be configured thru the command line.  It can also be configured with Webmin using its GUI interface.&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4570</id>
		<title>Linux SSH and Samba Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4570"/>
		<updated>2011-07-14T14:30:25Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter 21 Linux Administration: A Beginners Guide&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Shell (SSH)&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SSH Basics (Page 479) &lt;br /&gt;
&lt;br /&gt;
Linux supports remote login access through several different servers including Telnet, VNC and even X. They all transfer data over the network in unencrypted form. SSH encrypts the password exchange and all subsequent data transfers. SSH provides file transfer features &amp;amp; the ability to tunnel other network protocols Several SSH servers are available, the most popular is the OpenSSH server OpenSSH can be launched using a super script or with a SysV startup script (preferred) Configuring Basic SSH Features (page 486) The main configuration file for the OpenSSH server is /etc/ssh/sshd_config (page 490) The default settings work for most systems. You might want to check or modify: Protocol Level: Version 2.0 is preferred due to known vulnerabilities in earlier versions. Permit_Root_Login: The default is yes, but this is a security risk. X11_Forwarding: (X tunneling features) The default is no If you make changes to the configuration file, be sure to restart the server. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SSH Keys (Page 480)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
SSH uses a security system that involves two keys: a Private Key and Public Key All parties that engage in an SSH communication have their own keys. These keys are mathematically linked so that data encrypted with a Public Key may only be decrypted with the matching Private Key. On the server, there are normally 4 to 6 keys and they are stored in /etc/ssh If keys are not present, you can generate them with the ssh-keygen command On the client, keys are stored in the ~/.ssh/known_hosts file. You can pre-populate this file on the client to prevent security warnings. &lt;br /&gt;
Some good references are listed on page 483 if you want to delve further into encryption.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SSH Clients (Page 485)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
There are several clients available for use with SSH.&lt;br /&gt;
  &lt;br /&gt;
&#039;&#039;&#039;PuTTY&#039;&#039;&#039; is one of the oldest and most popular SSH Clients for Win32 platforms.  It is free and can be downloaded at http://www.chiark.greenend.org.uk/~sgtatham/putty/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;OpenSSH&#039;&#039;&#039; for Mac OS X&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MindTerm&#039;&#039;&#039; This program supports V1 and 2 of SSH.  Written in java it works on many UNIX platforms. http://www.cryptzone.com/products/agmindterm/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;FreeSSH&#039;&#039;&#039; for Windows http://www.freessh.org/ keeps track of programs both free and commercial for SSH clients and implementations.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SecureCRT&#039;&#039;&#039; for windows.  Commercial product. http://www.vandyke.com/products/securecrt/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Copy&#039;&#039;&#039; (SCP) via SSH (page 495) &lt;br /&gt;
&lt;br /&gt;
SSH includes a file-copying command: scp It works like cp but you must specify the target computer You must use a colon at the end of this command to prevent renaming the file&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure FTP&#039;&#039;&#039; (SFTP) (page 495)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Secure FTP is a subsystem of the ssh daemon.  You can access the secure FTP server by using the sftp command line tool.&lt;br /&gt;
Configuring Logins without Passwords&lt;br /&gt;
SSH can be configured to allow logins without passing a password A security risk is if someone gains access to your account on the client, then they have your access to the server. To do this, you must generate a special key pair on the client, transfer the Public Key to the server, and place it in the ~/.ssh/authorized_keys file. &lt;br /&gt;
Setting Up SSH Port Tunnels (page 491) &lt;br /&gt;
SSH has the ability to encrypt other protocols and thus protect them in transit On the server side, must make sure that the /etc/ssh/sshd_config file has the option AllowTCPForwarding set to yes On the client side, you must establish a special SSH connection using the -N, -f, and the -L options.&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Chapter 24 Linux Administration: A Beginners Guide&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SAMBA&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Basics&#039;&#039;&#039; (page 548)&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Samba is a suite of applications for allowing UINX based systems to operate with Windows based operating systems.  Samba provides file and print sharing services to Windows clients.  It does this through the use of native Microsoft networking protocols SMB/CIFS. Samba has been ported to many number of platforms including most variants of UNIX and several non-unix environments. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Mechanics&#039;&#039;&#039; (page 548)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Linux password and login mechanism is different from Windows PDC (Primary Domain Controller) model and the Windows Active Directory model.  It is important for system administrators to keep passwords and logins consistent across both platforms.  Relative to Samba there are several options for handling username and password issuers.  &lt;br /&gt;
&lt;br /&gt;
Some of these are:&lt;br /&gt;
  &lt;br /&gt;
&#039;&#039;&#039;The Linux Pluggable Authentication Modules (PAM)&#039;&#039;&#039;.  Allows you to authenticate users against the PDC.  This means you will have 2 users lists, one local and one on the PDC but users only need to remember one.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba as PDC&#039;&#039;&#039; Allows you to keep all logins and passwords on the Linux system while all your windows systems authenticate with Samba.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Roll your own solution using Perl&#039;&#039;&#039; Allows for the use of your own custom script.  This can be done with WinPerl and Perl modules that allow changes to the Security Access manager (SAM) to update PDC’s password list.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Encrypted Passwords&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Windows uses encrypted passwords when communicating with the PDC and any server requiring authentication (including Linux and Samba). The encryption algorithm used by windows is different from UNIX so it is therefore not compatible.  &lt;br /&gt;
&lt;br /&gt;
Your choices in dealing with this are:&lt;br /&gt;
  1. Edit the registry on windows clients to disable the use of encrypted passwords. (As of v3 of Samba, this is no longer necessary)&lt;br /&gt;
  2. Configure Samba to use encrypted passwords.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Daemons&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Samba code is actually composed of  several components.  The book examines three.&lt;br /&gt;
  1. SMBD – handles the actual sharing of file systems and printer services&lt;br /&gt;
  2. NMBD – is responsible for handling NETBIOS name service requests&lt;br /&gt;
  3. WINBINDD – can be used to query native Windows servers for user and group information that can then be used on purely Linux/UNIX platforms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installing and Running Samba&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Can be installed using yum, apt-get, or can be done via source. Once installed Samba can be configured thru the command line.  It can also be configured with Webmin using its GUI interface.&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4547</id>
		<title>Linux SSH and Samba Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4547"/>
		<updated>2011-07-13T18:09:36Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter 21 Linux Administration: A Beginners Guide&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Shell (SSH)&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Basics (Page 479) &lt;br /&gt;
Linux supports remote login access through several different servers including Telnet, VNC and even X. They all transfer data over the network in unencrypted form. SSH encrypts the password exchange and all subsequent data transfers. SSH provides file transfer features &amp;amp; the ability to tunnel other network protocols Several SSH servers are available, the most popular is the OpenSSH server OpenSSH can be launched using a super script or with a SysV startup script (preferred) Configuring Basic SSH Features (page 486) The main configuration file for the OpenSSH server is /etc/ssh/sshd_config (page 490) The default settings work for most systems. You might want to check or modify: Protocol Level: Version 2.0 is preferred due to known vulnerabilities in earlier versions. Permit_Root_Login: The default is yes, but this is a security risk. X11_Forwarding: (X tunneling features) The default is no If you make changes to the configuration file, be sure to restart the server. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SSH Keys (Page 480)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
SSH uses a security system that involves two keys: a Private Key and Public Key All parties that engage in an SSH communication have their own keys. These keys are mathematically linked so that data encrypted with a Public Key may only be decrypted with the matching Private Key. On the server, there are normally 4 to 6 keys and they are stored in /etc/ssh If keys are not present, you can generate them with the ssh-keygen command On the client, keys are stored in the ~/.ssh/known_hosts file. You can pre-populate this file on the client to prevent security warnings. &lt;br /&gt;
Some good references are listed on page 483 if you want to delve further into encryption.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Clients (Page 485)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
There are several clients available for use with SSH.&lt;br /&gt;
  &lt;br /&gt;
&#039;&#039;&#039;PuTTY&#039;&#039;&#039; is one of the oldest and most popular SSH Clients for Win32 platforms.  It is free and can be downloaded at http://www.chiark.greenend.org.uk/~sgtatham/putty/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;OpenSSH&#039;&#039;&#039; for Mac OS X&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MindTerm&#039;&#039;&#039; This program supports V1 and 2 of SSH.  Written in java it works on many UNIX platforms. http://www.cryptzone.com/products/agmindterm/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;FreeSSH&#039;&#039;&#039; for Windows http://www.freessh.org/ keeps track of programs both free and commercial for SSH clients and implementations.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SecureCRT&#039;&#039;&#039; for windows.  Commercial product. http://www.vandyke.com/products/securecrt/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Copy&#039;&#039;&#039; (SCP) via SSH (page 495) &lt;br /&gt;
&lt;br /&gt;
SSH includes a file-copying command: scp It works like cp but you must specify the target computer You must use a colon at the end of this command to prevent renaming the file&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure FTP&#039;&#039;&#039; (SFTP) (page 495)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Secure FTP is a subsystem of the ssh daemon.  You can access the secure FTP server by using the sftp command line tool.&lt;br /&gt;
Configuring Logins without Passwords&lt;br /&gt;
SSH can be configured to allow logins without passing a password A security risk is if someone gains access to your account on the client, then they have your access to the server. To do this, you must generate a special key pair on the client, transfer the Public Key to the server, and place it in the ~/.ssh/authorized_keys file. &lt;br /&gt;
Setting Up SSH Port Tunnels (page 491) &lt;br /&gt;
SSH has the ability to encrypt other protocols and thus protect them in transit On the server side, must make sure that the /etc/ssh/sshd_config file has the option AllowTCPForwarding set to yes On the client side, you must establish a special SSH connection using the -N, -f, and the -L options.&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Chapter 24 Linux Administration: A Beginners Guide&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SAMBA&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Basics&#039;&#039;&#039; (page 548)&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Samba is a suite of applications for allowing UINX based systems to operate with Windows based operating systems.  Samba provides file and print sharing services to Windows clients.  It does this through the use of native Microsoft networking protocols SMB/CIFS. Samba has been ported to many number of platforms including most variants of UNIX and several non-unix environments. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Mechanics&#039;&#039;&#039; (page 548)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Linux password and login mechanism is different from Windows PDC (Primary Domain Controller) model and the Windows Active Directory model.  It is important for system administrators to keep passwords and logins consistent across both platforms.  Relative to Samba there are several options for handling username and password issuers.  &lt;br /&gt;
&lt;br /&gt;
Some of these are:&lt;br /&gt;
  &lt;br /&gt;
&#039;&#039;&#039;The Linux Pluggable Authentication Modules (PAM)&#039;&#039;&#039;.  Allows you to authenticate users against the PDC.  This means you will have 2 users lists, one local and one on the PDC but users only need to remember one.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba as PDC&#039;&#039;&#039; Allows you to keep all logins and passwords on the Linux system while all your windows systems authenticate with Samba.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Roll your own solution using Perl&#039;&#039;&#039; Allows for the use of your own custom script.  This can be done with WinPerl and Perl modules that allow changes to the Security Access manager (SAM) to update PDC’s password list.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Encrypted Passwords&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Windows uses encrypted passwords when communicating with the PDC and any server requiring authentication (including Linux and Samba). The encryption algorithm used by windows is different from UNIX so it is therefore not compatible.  &lt;br /&gt;
&lt;br /&gt;
Your choices in dealing with this are:&lt;br /&gt;
  1. Edit the registry on windows clients to disable the use of encrypted passwords. (As of v3 of Samba, this is no longer necessary)&lt;br /&gt;
  2. Configure Samba to use encrypted passwords.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Daemons&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Samba code is actually composed of  several components.  The book examines three.&lt;br /&gt;
  1. SMBD – handles the actual sharing of file systems and printer services&lt;br /&gt;
  2. NMBD – is responsible for handling NETBIOS name service requests&lt;br /&gt;
  3. WINBINDD – can be used to query native Windows servers for user and group information that can then be used on purely Linux/UNIX platforms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installing and Running Samba&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Can be installed using yum, apt-get, or can be done via source. Once installed Samba can be configured thru the command line.  It can also be configured with Webmin using its GUI interface.&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4546</id>
		<title>Linux SSH and Samba Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4546"/>
		<updated>2011-07-13T18:08:19Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter 21 Linux Administration: A Beginners Guide&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Shell (SSH)&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Basics (Page 479) &lt;br /&gt;
Linux supports remote login access through several different servers including Telnet, VNC and even X. They all transfer data over the network in unencrypted form. SSH encrypts the password exchange and all subsequent data transfers. SSH provides file transfer features &amp;amp; the ability to tunnel other network protocols Several SSH servers are available, the most popular is the OpenSSH server OpenSSH can be launched using a super script or with a SysV startup script (preferred) Configuring Basic SSH Features (page 486) The main configuration file for the OpenSSH server is /etc/ssh/sshd_config (page 490) The default settings work for most systems. You might want to check or modify: Protocol Level: Version 2.0 is preferred due to known vulnerabilities in earlier versions. Permit_Root_Login: The default is yes, but this is a security risk. X11_Forwarding: (X tunneling features) The default is no If you make changes to the configuration file, be sure to restart the server. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SSH Keys (Page 480)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
SSH uses a security system that involves two keys: a Private Key and Public Key All parties that engage in an SSH communication have their own keys. These keys are mathematically linked so that data encrypted with a Public Key may only be decrypted with the matching Private Key. On the server, there are normally 4 to 6 keys and they are stored in /etc/ssh If keys are not present, you can generate them with the ssh-keygen command On the client, keys are stored in the ~/.ssh/known_hosts file. You can pre-populate this file on the client to prevent security warnings. &lt;br /&gt;
Some good references are listed on page 483 if you want to delve further into encryption.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Clients (Page 485)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
There are several clients available for use with SSH.  &lt;br /&gt;
&#039;&#039;&#039;PuTTY&#039;&#039;&#039; is one of the oldest and most popular SSH Clients for Win32 platforms.  It is free and can be downloaded at http://www.chiark.greenend.org.uk/~sgtatham/putty/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;OpenSSH&#039;&#039;&#039; for Mac OS X&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;MindTerm&#039;&#039;&#039; This program supports V1 and 2 of SSH.  Written in java it works on many UNIX platforms. http://www.cryptzone.com/products/agmindterm/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;FreeSSH&#039;&#039;&#039; for Windows http://www.freessh.org/ keeps track of programs both free and commercial for SSH clients and implementations.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SecureCRT&#039;&#039;&#039; for windows.  Commercial product. http://www.vandyke.com/products/securecrt/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Copy&#039;&#039;&#039; (SCP) via SSH (page 495) &lt;br /&gt;
&lt;br /&gt;
SSH includes a file-copying command: scp It works like cp but you must specify the target computer You must use a colon at the end of this command to prevent renaming the file &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure FTP&#039;&#039;&#039; (SFTP) (page 495)&lt;br /&gt;
&lt;br /&gt;
Secure FTP is a subsystem of the ssh daemon.  You can access the secure FTP server by using the sftp command line tool.&lt;br /&gt;
Configuring Logins without Passwords&lt;br /&gt;
SSH can be configured to allow logins without passing a password A security risk is if someone gains access to your account on the client, then they have your access to the server. To do this, you must generate a special key pair on the client, transfer the Public Key to the server, and place it in the ~/.ssh/authorized_keys file. &lt;br /&gt;
Setting Up SSH Port Tunnels (page 491) &lt;br /&gt;
SSH has the ability to encrypt other protocols and thus protect them in transit On the server side, must make sure that the /etc/ssh/sshd_config file has the option AllowTCPForwarding set to yes On the client side, you must establish a special SSH connection using the -N, -f, and the -L options. &lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Chapter 24 Linux Administration: A Beginners Guide&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SAMBA – Chapter 24&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Basics&#039;&#039;&#039; (page 548)&lt;br /&gt;
 &lt;br /&gt;
Samba is a suite of applications for allowing UINX based systems to operate with Windows based operating systems.  Samba provides file and print sharing services to Windows clients.  It does this through the use of native Microsoft networking protocols SMB/CIFS. Samba has been ported to many number of platforms including most variants of UNIX and several non-unix environments. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Mechanics (page 548)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Linux password and login mechanism is different from Windows PDC (Primary Domain Controller) model and the Windows Active Directory model.  It is important for system administrators to keep passwords and logins consistent across both platforms.  Relative to Samba there are several options for handling username and password issuers.  &lt;br /&gt;
&lt;br /&gt;
Some of these are:&lt;br /&gt;
  &lt;br /&gt;
&#039;&#039;&#039;The Linux Pluggable Authentication Modules (PAM)&#039;&#039;&#039;.  Allows you to authenticate users against the PDC.  This means you will have 2 users lists, one local and one on the PDC but users only need to remember one.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba as PDC&#039;&#039;&#039; Allows you to keep all logins and passwords on the Linux system while all your windows systems authenticate with Samba.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Roll your own solution using Perl&#039;&#039;&#039; Allows for the use of your own custom script.  This can be done with WinPerl and Perl modules that allow changes to the Security Access manager (SAM) to update PDC’s password list.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Encrypted Passwords&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Windows uses encrypted passwords when communicating with the PDC and any server requiring authentication (including Linux and Samba). The encryption algorithm used by windows is different from UNIX so it is therefore not compatible.  &lt;br /&gt;
&lt;br /&gt;
Your choices in dealing with this are:&lt;br /&gt;
  1. Edit the registry on windows clients to disable the use of encrypted passwords. (As of v3 of Samba, this is no longer necessary)&lt;br /&gt;
  2. Configure Samba to use encrypted passwords.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Daemons&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Samba code is actually composed of  several components.  The book examines three.&lt;br /&gt;
  1. SMBD – handles the actual sharing of file systems and printer services&lt;br /&gt;
  2. NMBD – is responsible for handling NETBIOS name service requests&lt;br /&gt;
  3. WINBINDD – can be used to query native Windows servers for user and group information that can then be used on purely Linux/UNIX platforms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installing and Running Samba&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Can be installed using yum, apt-get, or can be done via source. Once installed Samba can be configured thru the command line.  It can also be configured with Webmin using its GUI interface.&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_21%2624&amp;diff=4545</id>
		<title>Chapter 21&amp;24</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_21%2624&amp;diff=4545"/>
		<updated>2011-07-13T18:02:33Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: moved Chapter 21&amp;amp;24 to Chapter 21 &amp;amp; 24&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Chapter 21 &amp;amp; 24]]&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4544</id>
		<title>Linux SSH and Samba Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4544"/>
		<updated>2011-07-13T18:02:33Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: moved Chapter 21&amp;amp;24 to Chapter 21 &amp;amp; 24&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter 21 Linux Administration: A Beginners Guide&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Shell (SSH)&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Basics (Page 479) &lt;br /&gt;
Linux supports remote login access through several different servers including Telnet, VNC and even X. They all transfer data over the network in unencrypted form. SSH encrypts the password exchange and all subsequent data transfers. SSH provides file transfer features &amp;amp; the ability to tunnel other network protocols Several SSH servers are available, the most popular is the OpenSSH server OpenSSH can be launched using a super script or with a SysV startup script (preferred) Configuring Basic SSH Features (page 486) The main configuration file for the OpenSSH server is /etc/ssh/sshd_config (page 490) The default settings work for most systems. You might want to check or modify: Protocol Level: Version 2.0 is preferred due to known vulnerabilities in earlier versions. Permit_Root_Login: The default is yes, but this is a security risk. X11_Forwarding: (X tunneling features) The default is no If you make changes to the configuration file, be sure to restart the server. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SSH Keys (Page 480)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
SSH uses a security system that involves two keys: a Private Key and Public Key All parties that engage in an SSH communication have their own keys. These keys are mathematically linked so that data encrypted with a Public Key may only be decrypted with the matching Private Key. On the server, there are normally 4 to 6 keys and they are stored in /etc/ssh If keys are not present, you can generate them with the ssh-keygen command On the client, keys are stored in the ~/.ssh/known_hosts file. You can pre-populate this file on the client to prevent security warnings. &lt;br /&gt;
Some good references are listed on page 483 if you want to delve further into encryption.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Clients (Page 485)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
There are several clients available for use with SSH.  &lt;br /&gt;
&#039;&#039;&#039;PuTTY&#039;&#039;&#039; is one of the oldest and most popular SSH Clients for Win32 platforms.  It is free and can be downloaded at http://www.chiark.greenend.org.uk/~sgtatham/putty/&lt;br /&gt;
&#039;&#039;&#039;OpenSSH&#039;&#039;&#039; for Mac OS X&lt;br /&gt;
&#039;&#039;&#039;MindTerm&#039;&#039;&#039; This program supports V1 and 2 of SSH.  Written in java it works on many UNIX platforms. http://www.cryptzone.com/products/agmindterm/&lt;br /&gt;
&#039;&#039;&#039;FreeSSH&#039;&#039;&#039; for Windows http://www.freessh.org/ keeps track of programs both free and commercial for SSH clients and implementaions.&lt;br /&gt;
&#039;&#039;&#039;SecureCRT&#039;&#039;&#039; for windows.  Commercial product. http://www.vandyke.com/products/securecrt/index.html&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Copy&#039;&#039;&#039; (SCP) via SSH (page 495) &lt;br /&gt;
&lt;br /&gt;
SSH includes a file-copying command: scp It works like cp but you must specify the target computer You must use a colon at the end of this command to prevent renaming the file &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure FTP&#039;&#039;&#039; (SFTP) (page 495)&lt;br /&gt;
&lt;br /&gt;
Secure FTP is a subsystem of the ssh daemon.  You can access the secure FTP server by using the sftp command line tool.&lt;br /&gt;
Configuring Logins without Passwords&lt;br /&gt;
SSH can be configured to allow logins without passing a password A security risk is if someone gains access to your account on the client, then they have your access to the server. To do this, you must generate a special key pair on the client, transfer the Public Key to the server, and place it in the ~/.ssh/authorized_keys file. &lt;br /&gt;
Setting Up SSH Port Tunnels (page 491) &lt;br /&gt;
SSH has the ability to encrypt other protocols and thus protect them in transit On the server side, must make sure that the /etc/ssh/sshd_config file has the option AllowTCPForwarding set to yes On the client side, you must establish a special SSH connection using the -N, -f, and the -L options. &lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Chapter 24 Linux Administration: A Beginners Guide&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SAMBA – Chapter 24&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Basics&#039;&#039;&#039; (page 548)&lt;br /&gt;
 &lt;br /&gt;
Samba is a suite of applications for allowing UINX based systems to operate with Windows based operating systems.  Samba provides file and print sharing services to Windows clients.  It does this through the use of native Microsoft networking protocols SMB/CIFS. Samba has been ported to many number of platforms including most variants of UNIX and several non-unix environments. &lt;br /&gt;
Samba Mechanics (page 548)&lt;br /&gt;
&lt;br /&gt;
The Linux password and login mechanism is different from Windows PDC (Primary Domain Controller) model and the Windows Active Directory model.  It is important for system administrators to keep passwords and logins consistent across both platforms.  Relative to Samba there are several options for handling username and password issuers.  Some of these are:  &lt;br /&gt;
The Linux Pluggable Authentication Modules (PAM).  Allows you to authenticate users against the PDC.  This means you will have 2 users lists, one local and one on the PDC but users only need to remember one.&lt;br /&gt;
Samba as PDC Allows you to keep all logins and passwords on the Linux system while all your windows systems authenticate with Samba.&lt;br /&gt;
Roll your own solution using Perl Allows for the use of your own custom script.  This can be done with WinPerl and Perl modules that allow changes to the Security Access manager (SAM) to update PDC’s password list.&lt;br /&gt;
Encrypted Passwords - Windows uses encrypted passwords when communicating with the PDC and any server requiring authentication (including Linux and Samba). The encryption algorithm used by windows is different from UNIX so it is therefore not compatible.  Your choices in dealing with this are  1) Edit the registry on windows clients to disable the use of encrypted passwords. (As of v3 of Samba, this is no longer necessary); or 2) Configure Samba to use encrypted passwords.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Daemons&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Samba code is actually composed of  several components.  The book examines three.&lt;br /&gt;
  1. SMBD – handles the actual sharing of file systems and printer services&lt;br /&gt;
  2. NMBD – is responsible for handling NETBIOS name service requests&lt;br /&gt;
  3. WINBINDD – can be used to query native Windows servers for user and group information that can then be used on purely Linux/UNIX platforms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installing and Running Samba&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Can be installed using yum, apt-get, or can be done via source. Once installed Samba can be configured thru the command line.  It can also be configured with Webmin using its GUI interface.&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter2124&amp;diff=4543</id>
		<title>Chapter2124</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter2124&amp;diff=4543"/>
		<updated>2011-07-13T18:02:21Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: moved Chapter2124 to Chapter 21&amp;amp;24&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Chapter 21&amp;amp;24]]&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4542</id>
		<title>Linux SSH and Samba Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4542"/>
		<updated>2011-07-13T18:02:21Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: moved Chapter2124 to Chapter 21&amp;amp;24&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter 21 Linux Administration: A Beginners Guide&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Shell (SSH)&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Basics (Page 479) &lt;br /&gt;
Linux supports remote login access through several different servers including Telnet, VNC and even X. They all transfer data over the network in unencrypted form. SSH encrypts the password exchange and all subsequent data transfers. SSH provides file transfer features &amp;amp; the ability to tunnel other network protocols Several SSH servers are available, the most popular is the OpenSSH server OpenSSH can be launched using a super script or with a SysV startup script (preferred) Configuring Basic SSH Features (page 486) The main configuration file for the OpenSSH server is /etc/ssh/sshd_config (page 490) The default settings work for most systems. You might want to check or modify: Protocol Level: Version 2.0 is preferred due to known vulnerabilities in earlier versions. Permit_Root_Login: The default is yes, but this is a security risk. X11_Forwarding: (X tunneling features) The default is no If you make changes to the configuration file, be sure to restart the server. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SSH Keys (Page 480)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
SSH uses a security system that involves two keys: a Private Key and Public Key All parties that engage in an SSH communication have their own keys. These keys are mathematically linked so that data encrypted with a Public Key may only be decrypted with the matching Private Key. On the server, there are normally 4 to 6 keys and they are stored in /etc/ssh If keys are not present, you can generate them with the ssh-keygen command On the client, keys are stored in the ~/.ssh/known_hosts file. You can pre-populate this file on the client to prevent security warnings. &lt;br /&gt;
Some good references are listed on page 483 if you want to delve further into encryption.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Clients (Page 485)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
There are several clients available for use with SSH.  &lt;br /&gt;
&#039;&#039;&#039;PuTTY&#039;&#039;&#039; is one of the oldest and most popular SSH Clients for Win32 platforms.  It is free and can be downloaded at http://www.chiark.greenend.org.uk/~sgtatham/putty/&lt;br /&gt;
&#039;&#039;&#039;OpenSSH&#039;&#039;&#039; for Mac OS X&lt;br /&gt;
&#039;&#039;&#039;MindTerm&#039;&#039;&#039; This program supports V1 and 2 of SSH.  Written in java it works on many UNIX platforms. http://www.cryptzone.com/products/agmindterm/&lt;br /&gt;
&#039;&#039;&#039;FreeSSH&#039;&#039;&#039; for Windows http://www.freessh.org/ keeps track of programs both free and commercial for SSH clients and implementaions.&lt;br /&gt;
&#039;&#039;&#039;SecureCRT&#039;&#039;&#039; for windows.  Commercial product. http://www.vandyke.com/products/securecrt/index.html&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Copy&#039;&#039;&#039; (SCP) via SSH (page 495) &lt;br /&gt;
&lt;br /&gt;
SSH includes a file-copying command: scp It works like cp but you must specify the target computer You must use a colon at the end of this command to prevent renaming the file &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure FTP&#039;&#039;&#039; (SFTP) (page 495)&lt;br /&gt;
&lt;br /&gt;
Secure FTP is a subsystem of the ssh daemon.  You can access the secure FTP server by using the sftp command line tool.&lt;br /&gt;
Configuring Logins without Passwords&lt;br /&gt;
SSH can be configured to allow logins without passing a password A security risk is if someone gains access to your account on the client, then they have your access to the server. To do this, you must generate a special key pair on the client, transfer the Public Key to the server, and place it in the ~/.ssh/authorized_keys file. &lt;br /&gt;
Setting Up SSH Port Tunnels (page 491) &lt;br /&gt;
SSH has the ability to encrypt other protocols and thus protect them in transit On the server side, must make sure that the /etc/ssh/sshd_config file has the option AllowTCPForwarding set to yes On the client side, you must establish a special SSH connection using the -N, -f, and the -L options. &lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Chapter 24 Linux Administration: A Beginners Guide&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SAMBA – Chapter 24&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Basics&#039;&#039;&#039; (page 548)&lt;br /&gt;
 &lt;br /&gt;
Samba is a suite of applications for allowing UINX based systems to operate with Windows based operating systems.  Samba provides file and print sharing services to Windows clients.  It does this through the use of native Microsoft networking protocols SMB/CIFS. Samba has been ported to many number of platforms including most variants of UNIX and several non-unix environments. &lt;br /&gt;
Samba Mechanics (page 548)&lt;br /&gt;
&lt;br /&gt;
The Linux password and login mechanism is different from Windows PDC (Primary Domain Controller) model and the Windows Active Directory model.  It is important for system administrators to keep passwords and logins consistent across both platforms.  Relative to Samba there are several options for handling username and password issuers.  Some of these are:  &lt;br /&gt;
The Linux Pluggable Authentication Modules (PAM).  Allows you to authenticate users against the PDC.  This means you will have 2 users lists, one local and one on the PDC but users only need to remember one.&lt;br /&gt;
Samba as PDC Allows you to keep all logins and passwords on the Linux system while all your windows systems authenticate with Samba.&lt;br /&gt;
Roll your own solution using Perl Allows for the use of your own custom script.  This can be done with WinPerl and Perl modules that allow changes to the Security Access manager (SAM) to update PDC’s password list.&lt;br /&gt;
Encrypted Passwords - Windows uses encrypted passwords when communicating with the PDC and any server requiring authentication (including Linux and Samba). The encryption algorithm used by windows is different from UNIX so it is therefore not compatible.  Your choices in dealing with this are  1) Edit the registry on windows clients to disable the use of encrypted passwords. (As of v3 of Samba, this is no longer necessary); or 2) Configure Samba to use encrypted passwords.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Daemons&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Samba code is actually composed of  several components.  The book examines three.&lt;br /&gt;
  1. SMBD – handles the actual sharing of file systems and printer services&lt;br /&gt;
  2. NMBD – is responsible for handling NETBIOS name service requests&lt;br /&gt;
  3. WINBINDD – can be used to query native Windows servers for user and group information that can then be used on purely Linux/UNIX platforms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installing and Running Samba&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Can be installed using yum, apt-get, or can be done via source. Once installed Samba can be configured thru the command line.  It can also be configured with Webmin using its GUI interface.&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4541</id>
		<title>Linux SSH and Samba Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Linux_SSH_and_Samba_Notes&amp;diff=4541"/>
		<updated>2011-07-13T18:00:57Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: Created page with &amp;quot;Chapter 21 Linux Administration: A Beginners Guide  &amp;#039;&amp;#039;&amp;#039;Secure Shell (SSH) &amp;#039;&amp;#039;&amp;#039; SSH Basics (Page 479)  Linux supports remote login access through several different servers includin...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter 21 Linux Administration: A Beginners Guide&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Shell (SSH)&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Basics (Page 479) &lt;br /&gt;
Linux supports remote login access through several different servers including Telnet, VNC and even X. They all transfer data over the network in unencrypted form. SSH encrypts the password exchange and all subsequent data transfers. SSH provides file transfer features &amp;amp; the ability to tunnel other network protocols Several SSH servers are available, the most popular is the OpenSSH server OpenSSH can be launched using a super script or with a SysV startup script (preferred) Configuring Basic SSH Features (page 486) The main configuration file for the OpenSSH server is /etc/ssh/sshd_config (page 490) The default settings work for most systems. You might want to check or modify: Protocol Level: Version 2.0 is preferred due to known vulnerabilities in earlier versions. Permit_Root_Login: The default is yes, but this is a security risk. X11_Forwarding: (X tunneling features) The default is no If you make changes to the configuration file, be sure to restart the server. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SSH Keys (Page 480)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
SSH uses a security system that involves two keys: a Private Key and Public Key All parties that engage in an SSH communication have their own keys. These keys are mathematically linked so that data encrypted with a Public Key may only be decrypted with the matching Private Key. On the server, there are normally 4 to 6 keys and they are stored in /etc/ssh If keys are not present, you can generate them with the ssh-keygen command On the client, keys are stored in the ~/.ssh/known_hosts file. You can pre-populate this file on the client to prevent security warnings. &lt;br /&gt;
Some good references are listed on page 483 if you want to delve further into encryption.&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
SSH Clients (Page 485)&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
There are several clients available for use with SSH.  &lt;br /&gt;
&#039;&#039;&#039;PuTTY&#039;&#039;&#039; is one of the oldest and most popular SSH Clients for Win32 platforms.  It is free and can be downloaded at http://www.chiark.greenend.org.uk/~sgtatham/putty/&lt;br /&gt;
&#039;&#039;&#039;OpenSSH&#039;&#039;&#039; for Mac OS X&lt;br /&gt;
&#039;&#039;&#039;MindTerm&#039;&#039;&#039; This program supports V1 and 2 of SSH.  Written in java it works on many UNIX platforms. http://www.cryptzone.com/products/agmindterm/&lt;br /&gt;
&#039;&#039;&#039;FreeSSH&#039;&#039;&#039; for Windows http://www.freessh.org/ keeps track of programs both free and commercial for SSH clients and implementaions.&lt;br /&gt;
&#039;&#039;&#039;SecureCRT&#039;&#039;&#039; for windows.  Commercial product. http://www.vandyke.com/products/securecrt/index.html&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Copy&#039;&#039;&#039; (SCP) via SSH (page 495) &lt;br /&gt;
&lt;br /&gt;
SSH includes a file-copying command: scp It works like cp but you must specify the target computer You must use a colon at the end of this command to prevent renaming the file &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure FTP&#039;&#039;&#039; (SFTP) (page 495)&lt;br /&gt;
&lt;br /&gt;
Secure FTP is a subsystem of the ssh daemon.  You can access the secure FTP server by using the sftp command line tool.&lt;br /&gt;
Configuring Logins without Passwords&lt;br /&gt;
SSH can be configured to allow logins without passing a password A security risk is if someone gains access to your account on the client, then they have your access to the server. To do this, you must generate a special key pair on the client, transfer the Public Key to the server, and place it in the ~/.ssh/authorized_keys file. &lt;br /&gt;
Setting Up SSH Port Tunnels (page 491) &lt;br /&gt;
SSH has the ability to encrypt other protocols and thus protect them in transit On the server side, must make sure that the /etc/ssh/sshd_config file has the option AllowTCPForwarding set to yes On the client side, you must establish a special SSH connection using the -N, -f, and the -L options. &lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
Chapter 24 Linux Administration: A Beginners Guide&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SAMBA – Chapter 24&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Basics&#039;&#039;&#039; (page 548)&lt;br /&gt;
 &lt;br /&gt;
Samba is a suite of applications for allowing UINX based systems to operate with Windows based operating systems.  Samba provides file and print sharing services to Windows clients.  It does this through the use of native Microsoft networking protocols SMB/CIFS. Samba has been ported to many number of platforms including most variants of UNIX and several non-unix environments. &lt;br /&gt;
Samba Mechanics (page 548)&lt;br /&gt;
&lt;br /&gt;
The Linux password and login mechanism is different from Windows PDC (Primary Domain Controller) model and the Windows Active Directory model.  It is important for system administrators to keep passwords and logins consistent across both platforms.  Relative to Samba there are several options for handling username and password issuers.  Some of these are:  &lt;br /&gt;
The Linux Pluggable Authentication Modules (PAM).  Allows you to authenticate users against the PDC.  This means you will have 2 users lists, one local and one on the PDC but users only need to remember one.&lt;br /&gt;
Samba as PDC Allows you to keep all logins and passwords on the Linux system while all your windows systems authenticate with Samba.&lt;br /&gt;
Roll your own solution using Perl Allows for the use of your own custom script.  This can be done with WinPerl and Perl modules that allow changes to the Security Access manager (SAM) to update PDC’s password list.&lt;br /&gt;
Encrypted Passwords - Windows uses encrypted passwords when communicating with the PDC and any server requiring authentication (including Linux and Samba). The encryption algorithm used by windows is different from UNIX so it is therefore not compatible.  Your choices in dealing with this are  1) Edit the registry on windows clients to disable the use of encrypted passwords. (As of v3 of Samba, this is no longer necessary); or 2) Configure Samba to use encrypted passwords.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Samba Daemons&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Samba code is actually composed of  several components.  The book examines three.&lt;br /&gt;
  1. SMBD – handles the actual sharing of file systems and printer services&lt;br /&gt;
  2. NMBD – is responsible for handling NETBIOS name service requests&lt;br /&gt;
  3. WINBINDD – can be used to query native Windows servers for user and group information that can then be used on purely Linux/UNIX platforms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Installing and Running Samba&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Can be installed using yum, apt-get, or can be done via source. Once installed Samba can be configured thru the command line.  It can also be configured with Webmin using its GUI interface.&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=4294</id>
		<title>Franske Current Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=4294"/>
		<updated>2011-04-06T16:32:55Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: /* CNT 2510 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=SPRING 2011=&lt;br /&gt;
==CNT 2510==&lt;br /&gt;
* List of resources that correspond to chapter for self study - John Cocchiarella&lt;br /&gt;
&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add to and update [[Intro to IPv6]]&lt;br /&gt;
* Create router/switch reference guide for CCNA 1 students&lt;br /&gt;
* Update VirtualBox startup script and create instructions for moving VMs between home and school with new version of Virualbox&lt;br /&gt;
&lt;br /&gt;
=FALL 2010=&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Understanding Linux Permission Sets]] - Casey McBride&lt;br /&gt;
* [[How to Setup NAT|NAT with a Linux System]] - Tsega Terefe&lt;br /&gt;
* Alphabetical Linux Command List - Don Bliss&lt;br /&gt;
* Linux vs. Windows 7 vs. Mac OS X - Andrew Westin&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Lab Maintenance - Samuel Francis&lt;br /&gt;
* Update/Correct Frame Relay and ISDN Labs - Adam Nelson &amp;amp; Dan Martin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Spring 2011=&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
* CatOS Guide, comparison to IOS - Mike Kaschner, Nouthou Vang, Mark Benolken&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=4293</id>
		<title>Franske Current Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=4293"/>
		<updated>2011-04-06T16:32:20Z</updated>

		<summary type="html">&lt;p&gt;Jacooch: /* SPRING 2011 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=SPRING 2011=&lt;br /&gt;
==CNT 2510==&lt;br /&gt;
* List of resources that correspond to chapter for self study&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add to and update [[Intro to IPv6]]&lt;br /&gt;
* Create router/switch reference guide for CCNA 1 students&lt;br /&gt;
* Update VirtualBox startup script and create instructions for moving VMs between home and school with new version of Virualbox&lt;br /&gt;
&lt;br /&gt;
=FALL 2010=&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Understanding Linux Permission Sets]] - Casey McBride&lt;br /&gt;
* [[How to Setup NAT|NAT with a Linux System]] - Tsega Terefe&lt;br /&gt;
* Alphabetical Linux Command List - Don Bliss&lt;br /&gt;
* Linux vs. Windows 7 vs. Mac OS X - Andrew Westin&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Lab Maintenance - Samuel Francis&lt;br /&gt;
* Update/Correct Frame Relay and ISDN Labs - Adam Nelson &amp;amp; Dan Martin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Spring 2011=&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
* CatOS Guide, comparison to IOS - Mike Kaschner, Nouthou Vang, Mark Benolken&lt;/div&gt;</summary>
		<author><name>Jacooch</name></author>
	</entry>
</feed>