Sniffer Network Optimization and Troubleshooting Handbook Copyright © 2002 by Syngress Publishing, Inc.All Rights Reserved

Total Page:16

File Type:pdf, Size:1020Kb

Sniffer Network Optimization and Troubleshooting Handbook Copyright © 2002 by Syngress Publishing, Inc.All Rights Reserved 219_sniffer_FM.qxd 6/28/02 2:28 PM Page i [email protected] With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based ser- vice that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations. [email protected] is an interactive treasure trove of useful infor- mation focusing on our book topics and related technologies. The site offers the following features: ■ One-year warranty against content obsolescence due to vendor product upgrades. You can access online updates for any affected chapters. ■ “Ask the Author” customer query forms that enable you to post questions to our authors and editors. ■ Exclusive monthly mailings in which our experts provide answers to reader queries and clear explanations of complex material. ■ Regularly updated links to sites specially selected by our editors for readers desiring additional reliable information on key topics. Best of all, the book you’re now holding is your key to this amazing site. Just go to www.syngress.com/solutions, and keep this book handy when you register to verify your purchase. Thank you for giving us the opportunity to serve your needs. And be sure to let us know if there’s anything else we can do to help you get the maximum value from your investment. We’re listening. www.syngress.com/solutions 219_sniffer_FM.qxd 6/28/02 2:28 PM Page ii 219_sniffer_FM.qxd 6/28/02 2:28 PM Page iii 1 YEAR UPGRADE BUYER PROTECTION PLAN Sniffer Pro Network Optimization & Troubleshooting Handbook Robert J. Shimonski Wally Eaton Umer Khan Yuri Gordienko 219_sniffer_FM.qxd 6/28/02 2:28 PM Page iv Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,” and “Ask the Author UPDATE®,” are registered trademarks of Syngress Publishing, Inc. “Mission Critical™,”“Hack Proofing®,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. KEY SERIAL NUMBER 001 4KT53GR4T9 002 VDKPR2MPE4 003 N5SN5MEU63 004 Z3PU7GD34B 005 VHN7UFMY6N 006 EM4GF34RN8 007 R4ATBGBV3T 008 56RHPBQR56 009 EB4B33N5AS 010 AJ25FCT6YH PUBLISHED BY Syngress Publishing, Inc. 800 Hingham Street Rockland, MA 02370 Sniffer Network Optimization and Troubleshooting Handbook Copyright © 2002 by Syngress Publishing, Inc.All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 ISBN: 1-931836-57-4 Technical Editors: Robert J. Shimonski and Umer Khan Cover Designer: Michael Kavish Technical Reviewer: Randy Cook Page Layout and Art by: Shannon Tozier Acquisitions Editor: Catherine B. Nolan Copy Editor: Darlene Bordwell Developmental Editor: Jonathan Babcock Indexer: Rich Carlson Distributed by Publishers Group West in the United States and Jaguar Book Group in Canada. 219_sniffer_FM.qxd 6/28/02 2:28 PM Page v Acknowledgments We would like to acknowledge the following people for their kindness and support in making this book possible. Ralph Troupe, Rhonda St. John, Emlyn Rhodes, and the team at Callisma for their invaluable insight into the challenges of designing, deploying and supporting world- class enterprise networks. Karen Cross, Lance Tilford, Meaghan Cunningham, Kim Wylie, Harry Kirchner, Kevin Votel, Kent Anderson, Frida Yara, Jon Mayes, John Mesjak, Peg O’Donnell, Sandra Patterson, Betty Redmond, Roy Remer, Ron Shapiro, Patricia Kelly,Andrea Tetrick, Jennifer Pascal, Doug Reil, David Dahl, Janis Carpenter, and Susan Fryer of Publishers Group West for sharing their incredible marketing experience and expertise. Jacquie Shanahan,AnnHelen Lindeholm, David Burton, Febea Marinetti, and Rosie Moss of Elsevier Science for making certain that our vision remains worldwide in scope. David Buckland, Daniel Loh,Wendi Wong, Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan, and Joseph Chan of Transquest Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Jackie Gross, Gayle Voycey,Alexia Penny,Anik Robitaille, Craig Siddall, Darlene Morrow, Iolanda Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associates for all their help and enthusiasm representing our product in Canada. Lois Fraser, Connie McMenemy, Shannon Russell, and the rest of the great folks at Jaguar Book Group for their help with distribution of Syngress books in Canada. A special welcome to the folks at Woodslane in Australia! Thank you to David Scott and everyone there as we start selling Syngress titles through Woodslane in Australia, New Zealand, Papua New Guinea, Fiji Tonga,Solomon Islands, and the Cook Islands. v 219_sniffer_FM.qxd 6/28/02 2:28 PM Page vi 219_sniffer_FM.qxd 6/28/02 2:28 PM Page vii Contributors Wally Eaton (CNX, BSCS, CCNP,CCDP,MCSE, MCP+I, NET- WORK+, FCC) is Chief Security Officer for the city of Jacksonville, FL. Previously,Wally held the position of Senior Systems Field Engineer for the Unisys Corporation, retiring after 20 years.At Unisys his duties included installing, debugging, and maintaining hardware and system soft- ware for Unisys mainframe computers. He is currently enrolled in the graduate program of Capitol College of Maryland, pursuing a master’s of Science in Network Security. Yuri Gordienko (CCNP,CCNA, CCDA, MCSE) is a Backbone Engineer with AT&T Canada, one of the largest Canadian ISPs. He is responsible for engineering and support of the national backbone. His specialties include Cisco routers and switches; network architecture and optimization; design and rollout of Internet Data Centers (IDC) in Montreal,Toronto, and Vancouver; and deployment of AT&T Canada route servers.Yuri is also a part-time instructor at RCC College,Toronto, teaching a computer communications course. He has contributed to sev- eral Syngress certification books, including Cisco Certified Design Associate Study Guide and Cisco Certified Network Associate Study Guide, Second Edition. Yuri holds a degree in Computation Physics. Eric Ouellet (CISSP) is a Senior Partner with Secure Systems Design Group, a network design and security consultancy based in Ottawa, Ontario, Canada. He specializes in the implementation of networks and security infrastructures from both a design and a hands-on perspective. Over his career he has been responsible for designing, installing, and trou- bleshooting WANs using Cisco, Nortel, and Alcatel equipment, configured to support voice, data and video conferencing services over terrestrial, satellite relay, wireless and trusted communication links. Eric has also been responsible for designing some of the leading Public Key Infrastructure deployments currently in use and for devising operational policy and procedures to meet the Electronic Signature Act vii 219_sniffer_FM.qxd 6/28/02 2:28 PM Page viii (E-Sign) and the Health Insurance Portability and Accountability Act (HIPAA). He has provided his services to financial, commercial, govern- ment, and military customers including United States Federal Government, Canadian Federal Government and NATO. He regularly speaks at leading security conferences and teaches networking and CISSP classes. He co-authored Hack Proofing Your Wireless Network (Syngress Publishing, ISBN: 1-928994-59-8) and Building A Cisco Wireless LAN (Syngress Publishing, ISBN: 1-928994-58-X). Eric would like to acknowledge the understanding and support of his family and friends during the writing of this book, along with PK, FS, SJ, MW,ATN, SM, and “The Boys” for being who they are. Contributor and Technical Reviewer Randy Cook (MCSE, SCSA) is the Senior UNIX Systems Administrator and Network Engineer for Sapphire Technologies, one of the world’s leading staffing organizations. Randy supports a wide variety of operating systems and mission-critical applications in high-threat environments. Randy has been the co-author and technical editor for several Syngress books including the Sun Certified System Administrator for Solaris 8.0 Study Guide (ISBN: 007-212369-9) and Hack Proofing Sun Solaris 8 (ISBN: 1-928994-44-X). He has also published technical articles for IT industry magazines and hosted a syndicated radio news program. viii 219_sniffer_FM.qxd 6/28/02 2:28 PM Page ix Technical Editors and Contributors Robert J. Shimonski (SCP,CCDP,CCNP,Nortel NNCSS, MCSE, MCP+I, Master CNE, CIP,CIBS, CWP,CIW,GSEC, GCIH, Server+, Network+, Inet+,A+, eBiz+,TICSA, SPS) is the Lead Network Engineer and Security Analyst for a leading manufacturer and provider of linear motion products and engineering.
Recommended publications
  • TCP/IP Fundamentals for Microsoft Windows
    TCP/IP Fundamentals for Microsoft Windows Microsoft Corporation Published: May 21, 2006 Updated: Jan 9, 2012 Author: Joseph Davies Editor: Anne Taussig Abstract This online book is a structured, introductory approach to the basic concepts and principles of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, how the most important protocols function, and their basic configuration in the Microsoft® Windows Vista™, Windows Server® 2008, Windows® XP, and Windows Server 2003 families of operating systems. This book is primarily a discussion of concepts and principles to lay a conceptual foundation for the TCP/IP protocol suite and provides an integrated discussion of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This content is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. The terms of use of this document can be found at http://www.microsoft.com/info/cpyright.mspx. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
    [Show full text]
  • Windows Server 2003 Security Guide
    Microsoft Solutions for Security and Compliance Windows Server 2003 Security Guide April 26, 2006 © 2006 Microsoft Corporation. This work is licensed under the Creative Commons Attribution-Non Commercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. Table of Contents iii Contents Chapter 1: Introduction to the Windows Server 2003 Security Guide ............. 1 Overview....................................................................................................1 Executive Summary .....................................................................................1 Who Should Read This Guide.........................................................................2 Scope of this Guide......................................................................................2 Chapter Summaries .....................................................................................3 Chapter 1: Introduction to the Windows Server 2003 Security Guide .............4 Chapter 2: Windows Server 2003 Hardening Mechanisms ............................4 Chapter 3: The Domain Policy..................................................................4 Chapter 4: The Member Server Baseline Policy ...........................................4 Chapter 5: The Domain Controller Baseline Policy .......................................5 Chapter 6: The Infrastructure Server Role .................................................5
    [Show full text]
  • Management Through Firewalls in Relation to Microsoft NT and Windows 2000
    Management through firewalls in relation to Microsoft NT and Windows 2000 Claus Jespersen Hewlett-Packard A/S Vestre Kongevej 4-6 DK-8260 Viby J Denmark Direct: (45) 4599 1829 Fax: (45) 8733 1888 e-mail: Mobile: (45) 4060 1829 [email protected] Solution Architect OpenView/Internet specialist Prepared by: Claus Jespersen Solution Architect Openview/Internet specialist Date Prepared: Februar 2000 Windows 2000 management Management through firewalls in relation to Microsoft NT and Windows 2000 ÿ Document Information Project Name: Management through firewalls in relation to Windows 2000 Project Manager: Document Version No: 1.0 FocusPM Phase: Document Version Date: 17. February 2000 Quality Review Method: Prepared By: Claus Jespersen Preparation Date: 17. February 2000 Reviewed By: Review Date: Distribution List From Date Phone/Fax Claus Jespersen, Hewlett-Packard Denmark, 17. February +4545991829 [email protected] 2000 To Action* Due Date Phone/Fax * Action Types: Approve, Review, Inform, File, Action Required, Attend Meeting, Other (please specify) Version History Ver. No. Ver. Date Revised By Description Filename 1.0 17. First finished version after a few drafts win2kfwmgt-v1.0.doc February 2000 FocusPM White paper by Claus Jespersen, HP Denmark Page2of2 Template (3 /2-Apr-1999) win2kfwmgt-v1.0 Last printed 16-Feb-00 21:58 Windows 2000 management Management through firewalls in relation to Microsoft NT and Windows 2000 ÿ 1. Proprietary Notice..............................................................................................................................................7
    [Show full text]
  • DPS7000/XTA User's Guide Security on the DIANE System
    A Security of the DIANE System ASCALE 7000 DPS7000/XT NOV Security REFERENCE 47 A2 02EL 01 DPS7000/XTA NOVASCALE 7000 Security of the DIANE System Security September 2004 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDEX 01 FRANCE REFERENCE 47 A2 02EL 01 The following copyright notice protects this book under Copyright laws which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull SAS 2004 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. Intel® and Itanium® are registered trademarks of Intel Corporation. Windows® and Microsoft® software are registered trademarks of Microsoft Corporation. UNIX® is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. Linux® is a registered trademark of Linus Torvalds. The information in this document is subject to change without notice. Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. Preface Preface Purpose This document targets customers requiring information about security issues on the Diane system (DPS7000/XTA). Several aspects of security are dealt with: NTFS permissions, essential services for the smooth running of the system and its maintenance, user groups and accounts, the NetBios share, the use of an antivirus software and the Windows updates.
    [Show full text]
  • Netbios, Netbeui, NBF, NBT, NBIPX, SMB, CIFS Networking
    NetBIOS, NetBEUI, NBF, NBT, NBIPX, SMB, CIFS Networking Timothy D Evans NetBIOS, NetBEUI, NBF, NBT, NBIPX, SMB, CIFS Networking by Timothy D Evans Copyright © 1998, 2003 by Timothy D Evans Unlimited non-commercial distribution of this document in its entirety is encouraged, please contact the author prior to commercial publication. Important: This documentation is revised from time to time. Some of the technology described is constantly changing and being developed, especially the higher level protocols. Thus this document may not always be up to date. The reader is encouraged to ensure they have the latest version. All trade marks are respectfully acknowledged. While every precaution has been taken in the preparation of this documentation the author assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Table of Contents Preface.....................................................................................................................................7 Who should read this documentation.......................................................................7 Organization of this documentation .........................................................................7 Acknowledgments .......................................................................................................8 Notation.........................................................................................................................8 Language .......................................................................................................................8
    [Show full text]
  • Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XP
    Solutions for Security and Compliance Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XP Version 2.0 Published: December 2005 For the latest information, please see www.microsoft.com/technet/security © 2005 Microsoft Corporation. This work is licensed under the Creative Commons Attribution-NonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. Threats and Countermeasures iii Contents 1 1 Introduction to Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XP..............................................1 Chapter Summaries ............................................ 4 Tools and Templates ........................................................ 6 2 7 Domain Level Policies.............................................. ...........................7 Account Policies ........................................................................... 7 More Information ......................................................................... 21 3 22 Audit Policy...................................................................................... .22 Audit Settings .................................................................. 24 More Information ......................................................................... 31 4 32 User Rights...................................................................... .................32
    [Show full text]
  • Windows 2000
    AppendixC Windows 2000 The Microsoft Windows operating system is a 32-bit preemptive multitasking operating system for Intel Pentium and later microprocessors. The successor to the Windows NT operating system, it was previously named Windows NT Version 5.0. Key goals for the system are portability, security, Portable Oper- ating System Interface (POSIX or IEEE Std. 1003.1) compliance, multiprocessor support, extensibility, international support, and compatibility with MS-DOS and Microsoft Windows applications. In this appendix, we discuss the key goals for this system, the layered architecture of the system that makes it so easy to use, the file system, networks, and the programming interface. C.1 History In the mid-1980s, Microsoft and IBM cooperated to develop the OS/2 operating system, which was written in assembly language for single-processor Intel 80286 systems. In 1988, Microsoft decided to make a fresh start and to develop a “new technology” (or NT) portable operating system that supported both the OS/2 and POSIX application programming interfaces (APIs). In October 1988, Dave Cutler, the architect of the DEC VAX/VMS operating system, was hired and given the charter of building this new operating system. Originally, the team planned for NT to use the OS/2 API as its native environment, but during development, it was changed to use the 32-bit Windows API (or Win32 API), reflecting the popularity of Windows 3.0.The first versions of NT were Windows NT 3.1 and Windows NT 3.1 Advanced Server. (At that time, 16-bit Windows was at Version 3.1.) Windows NT 4.0 adopted the Windows 95 user interface and incorporated Internet web-server and web-browser software.
    [Show full text]
  • MS-FSSO]: File Access Services System Overview
    [MS-FSSO]: File Access Services System Overview Intellectual Property Rights Notice for Protocol Documentation .Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages, standards as well as overviews of the interaction among each of these technologies. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you may make copies of it in order to develop implementations of the technologies described in the Open Specifications and may distribute portions of it in your implementations using these technologies or your documentation as necessary to properly document the implementation. You may also distribute in your implementation, with or without modification, any schema, IDL‘s, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that may cover your implementations of the technologies described in the Open Specifications. Neither this notice nor Microsoft's delivery of the documentation grants any licenses under those or any other Microsoft patents. However, a given Open Specification may be covered by Microsoft's Open Specification Promise (available here: http://www.microsoft.com/interop/osp) or the Community Promise (available here: http://www.microsoft.com/interop/cp/default.mspx). If you would prefer a written license, or if the technologies described in the Open Specifications are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected].
    [Show full text]
  • Page 1 of 22 Appendix B
    Appendix B - Windows 2000 Network Architecture Page 1 of 22 Windows 2000 Server Appendix B - Windows 2000 Network Architecture Microsoft® Windows® 2000 network architecture is composed of software components that provide networking abilities to the Windows 2000 operating system. This appendix describes the components, protocols, and interfaces within Windows 2000. In addition, it introduces the networking concepts that provide a foundation for the other chapters in this book to build upon. In This Appendix Overview of Windows 2000 Network Architecture Network Driver Interface Specification Network Protocols Transport Driver Interface Network Application Programming Interfaces Interprocess Communication Basic Network Services Related Information in the Resource Kit l For more information about SNA protocols, see "Interoperability with IBM Host Systems" in the Microsoft® Windows® 2000 Server Resource Kit Internetworking Guide. Overview of Windows 2000 Network Architecture This chapter describes software and hardware components and the connections between them that allow computers to function as a network. Windows 2000 network components are arranged in layers. Each layer has specific tasks to perform and within each layer more than one component can perform a similar task. The Windows 2000 network layers are described in the following sections from the bottom of the network architecture model up to the top. The layers are: Network Driver Interface Specification (NDIS) Layer NDIS is the layer that provides a communication path from a network transport to a physical device, such as a network adapter. NDIS acts as a boundary layer between network adapters and network protocols and manages the binding between these components. NDIS adds support for connection-oriented network media such as ATM and Integrated Services Digital Network (ISDN) and continues to support traditional connectionless network media such as Ethernet, Token Ring, and Fiber Distributed Data Interface (FDDI).
    [Show full text]
  • DAVE 2.5 Manual
    Network Your Macintosh With Wintel PCs DADAVEVE TM for Macintosh Copyright, Warranty and Trademark Notices This manual and the software it describes are Copyright © 1996-1999 by Thursby Software Systems, Inc., All Rights Reserved. The software described is furnished under license and may be used or copied only in accordance with the terms of such license. A copy of that license is included in Appendix A of this manual. Thursby Software Systems, Inc. (TSS) warrants that at the time of delivery of the original software supplied to the Licensee, and for a period of ninety (90) days thereaf- ter, that the original software will perform in accordance with the specifications described in this manual. TSS does not warrant that the Software will meet all of Licensee’s requirements or will operate uninterrupted or error-free. The extent of TSS’s liability under this warranty shall be limited to supplying, as soon as practicable, Code Corrections which TSS determines to be necessary, provided that written notice of a claimed problem is received by TSS within the warranty period. If after repeated efforts, TSS is unable to make the software operate as warranted, the Licensee may discontinue the DAVE license(s) and receive a refund of the License Fee(s) paid. THURSBY SOFTWARE SYSTEMS, INC. MAKES NO WARRANTIES, EITHER EXPRESSED OR IMPLIED, REGARDING THE ENCLOSED COMPUTER SOFT- WARE PACKAGE, ITS MERCHANTABILITY OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. THE EXCLUSION OF IMPLIED WARRANTIES IS NOT PERMITTED BY SOME STATES. THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. THIS WARRANTY PROVIDES YOU WITH SPECIFIC LEGAL RIGHTS.
    [Show full text]
  • File and Printer Sharing with Microsoft Windows
    Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft® Windows® allows you to share the contents of selected folders and locally attached printers with other computers. Windows XP, Windows 2000, Windows 98, Windows Millennium Edition (Me), and Windows NT® 4.0 support file and printer sharing. For each of these operating systems, this article describes the features, components, connection process, how to share a folder and connect to a shared folder, how to share a printer and connect to a shared printer, and how to manage file sharing in a small office/home office environment. Microsoft® Windows® XP Technical Article The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document.
    [Show full text]
  • Ethernet Design Considerations for Control System Networks an INTRODUCTION
    Ethernet Design Considerations for Control System Networks AN INTRODUCTION PUBLICATION ENET-SO001A-EN-E–November 2007 Contact Rockwell Customer Support Telephone — 1.440.646.3434 Online Support — http://www.rockwellautomation.com/support/ Copyright Notice © 2007 Rockwell Automation Technologies, Inc. All rights reserved. Printed in USA. This document and any accompanying Rockwell Software products are copyrighted by Rockwell Automation Technologies, Inc. Any reproduction and/or distribution without prior written consent from Rockwell Automation Technologies, Inc. is strictly prohibited. Please refer to the license agreement for details. Trademark Notices Allen-Bradley, ControlLogix, FactoryTalk, Rockwell Automation, Rockwell Software, RSLinx, RSView, and the Rockwell Software logo, are registered trademarks of Rockwell Automation, Inc. The following logos and products are trademarks of Rockwell Automation, Inc.: FactoryTalk Batch, FactoryTalk Historian Classic, FactoryTalk Directory, FactoryTalk Security, FactoryTalk View. Any Rockwell software or hardware not mentioned here are also trademarks, registered or otherwise, of Rockwell Automation Technologies, Inc. Other Trademarks ActiveX, Microsoft, Microsoft Access, SQL Server, Visual Basic, Visual C++, Visual SourceSafe, Windows, Windows ME, Windows NT, Windows 2000, Windows Server 2003, and Windows XP are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Adobe, Acrobat, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. ControlNet is a registered trademark of ControlNet International. DeviceNet is a trademark of the Open DeviceNet Vendor Association, Inc. (ODVA). Ethernet is a registered trademark of Digital Equipment Corporation, Intel, and Xerox Corporation. OLE for Process Control (OPC) is a registered trademark of the OPC Foundation.
    [Show full text]