Wednesday, 12 December 2012

How to assign a static ip to a mac-address through DHCP

How to assign a static ip to a mac-address through DHCP :-
DHCP stand for “ Dynamic Host Configuration Protocol ” that is used to assign IP-address in the client computers automatically. DHCP server can be a Windows Server machine , a linksys router , a Cisco router , Linux and Unix machine.
DHCP server can provide :-
  • IP address
  • Subnet mask
  • Domain name
  • Default gateway (routers)
  • DNS server address
  • WINS server address
DHCP Server works on the concept of DORA ( Discover , offer , Request and Acknowledgment ). You can easily understand the DHCP server working process with below image. :-)
How-to-assign-a-static-ip-to-a-mac-address-through-DHCP1
But there are lots of condition where you have define IP-address statically like Printer Serevr , NVR , Proxy server etc. Today i am going to show you How to assign a static ip to a mac-address through DHCP ?

1. On Windows Server :-

I am assuming, your server is already configured for DHCP server. DHCP server have the feature of DHCP Reservation where you are able to bind particular PC mac address with particular IP-address. After binding particular mac-address with DHCP server reservation, your DHCP server will assign a static IP to a particular IP-address.
Now open DHCP server from the Start > Programs > Administrative Tools > DHCP.
Now expand your DHCP server scope, click on the Particular Scope in which you want to bind your IP-address. here you have the Reservation option, Right-click on the Reservation option and select the New Reservation option.
How-to-assign-a-static-ip-to-a-mac-address-through-DHCP1
Now you have to enter your Reservation name , IP-address and mac-address of client. Select the DHCP only option and add it.
How-to-assign-a-static-ip-to-a-mac-address-through-DHCP1
Your Windows server DHCP reservation configuration done here. :-)

2.On Linksys Wireless Router :- 

Open your Linksys router web-admin page, Once in the web-based setup page, make sure the DHCP Server under the Network Setup section is set to Enabled, then click the DHCP Reservation button.
How-to-assign-a-static-ip-to-a-mac-address-through-DHCP1
The DHCP Reservation page will appear.  You can check the MAC Address corresponding to the IP Address of the device on the first table.
How-to-assign-a-static-ip-to-a-mac-address-through-DHCP1
3.On Cisco Router :- 
Manual bindings are IP addresses that have been manually mapped to the MAC addresses of hosts that are found in the DHCP database. Manual bindings are stored in NVRAM on the DHCP server. Manual bindings are just special address pools. There is no limit on the number of manual bindings, but you can only configure one manual binding per host pool.
Automatic bindings are IP addresses that have been automatically mapped to the MAC addresses of hosts that are found in the DHCP database. Automatic bindings are stored on a remote host called a database agent. The bindings are saved as text records for easy maintenance.
All DHCP clients send a client identifier (DHCP option 61) in the DHCP packet. To configure manual bindings, you must enter the client-identifier DHCP pool configuration command with the appropriate hexadecimal values identifying the DHCP client.
To configure a manual binding, first create a host pool, then specify the IP address of the client and client identifier or hardware address.
To configure manual bindings, use the following commands beginning in global configuration mode:
1- Router(config)# ip dhcp pool Test
2- Router(dhcp-config)# host 192.168.1.22 255.255.255.0
3-Router(dhcp-config)# client-identifier unique-identifier
Specifies the unique identifier for DHCP clients. This command is used for DHCP requests.
DHCP clients require client identifiers. The unique identification of the client is specified in dotted hexadecimal notation, for example, 01b7.0813.8811.66, where 01 represents the Ethernet media type.
4- Router(dhcp-config)# hardware-address hardware-address type
Specifies a hardware address for the client. This command is used for BOOTP requests.
The type value: Indicates the protocol of the hardware platform. Strings and values are acceptable.
The string options are:
ethernet
ieee802
The value options are:
1 10Mb Ethernet
6 IEEE 802
If no type is specified, the default protocol is Ethernet.
For more info :-
http://www.cisco.com/en/US/docs/ios/12_2/ip/configuration/guide/1cfdhcp.html
Hope you like my post.How to assign a static ip to a mac-address through DHCP.

Friday, 10 August 2012

GSplit : Splits Large Files Into Smaller Self-Uniting Pieces

GSplit : Splits Large Files Into Smaller Self-Uniting Pieces


GSplit is a powerful file splitter that lets you split your large files (like Self-Extracting and Zip archives, multimedia, song, music, picture, document files...) into a set of smaller files called pieces. These pieces are easier to copy to floppies, distribute over the Internet or through E-mail, share with friends or colleagues, archive to Zip disks or CDs. The pieces can be easily combined, using the generated Self-Uniting Executable, that automatically restores the original file for you without requiring GUnite. GSplit also includes advanced features like different splitting methods (blocked or spanned disks pieces), CRC32 checks (detects file corruption), splitting logs, keep file information, create specific pieces with your own names and shell integration.
GSpilt installs easily and works as a service from your context menu or through a Mac-like interface. With GSplit, you can simply point to a file and choose to split it. You can set the utility to default to a set number of pieces and specific placement, or have it question you each time. Using the novice-friendly interface is almost as easy. You follow the well-designed menus and answer simple questions. The program gets easier to use every time you split a file. Knitting the pieces back together is the easiest we've seen. The pieces are numbered and you simply execute the first one. Gsplit opens an informational dialog and combines the pieces almost instantly. Since the pieces are self-knitting, you don't need to send GSplit to those receiving your split files.
GSplit breaks apart any type of file, but isn't able to break apart media files into playable pieces. It is free, novice friendly, and complex enough for advanced users.
Download GSplit from Here
Source: gdgsoft.com

Wednesday, 16 May 2012

How to Check If Someone Is Stealing Your Wi-Fi

How-to-Check-If-Someone-Is-Stealing-Your-Wi-Fi
How to Check If Someone Is Stealing Your Wi-Fi :-
Today i am going to show you How easily you can find out the number of device connected in your wireless network.
Method 1 :- Use WnetWatcher Tool
Wireless Network Watcher is a small utility that scans your wireless network and displays the list of all computers and devices that are currently connected to your network.
For every computer or device that is connected to your network, the following information is displayed: IP address, MAC address, the company that manufactured the network card, and optionally the computer name.
You can also export the connected devices list into html/xml/csv/text file, or copy the list to the clipboard and then paste into Excel or other spreadsheet application.

Download
Method 2 :- Use Cisco network Magic
Cisco network Magician is very nice tool for Troubleshoot your connection problem , Test Internet speed , Find out the intruders in your network. whenever a new device will connect in your wireless network, it will give you notification about it.
How-to-Check-If-Someone-Is-Stealing-Your-Wi-Fi1
Even you can mark a new computer as intruder. in map option, it will show you all connected devices.
How-to-Check-If-Someone-Is-Stealing-Your-Wi-Fi1
Even when new device will connect with network, it will give you pop-notification about it.
How-to-Check-If-Someone-Is-Stealing-Your-Wi-Fi
Download Now
Method 3 :- SoftPerfect WiFi Guard
SoftPerfect WiFi Guard is an essential tool for everyone running a small WiFi network and striving to keep it secure. Generally, modern WiFi networks are well protected, but there are a number of weaknesses that can compromise your WiFi password; this includes vulnerabilities in encryption and brute force attacks. As a result, someone can gain unauthorised access to your Internet connection and LAN and exploit them while staying unnoticed.
Download Now
So, with these software’s you can easily find out the who is connecting with your network.
Hope you like my post.How to Check If Someone Is Stealing Your Wi-Fi.

Wednesday, 8 February 2012

Nagios XI : A Free Network Monitoring Tool

Nagios XI : A Free Network Monitoring Tool


Nagios XI is the most powerful IT infrastructure monitoring solution on the market. Nagios XI extends on proven, enterprise-class Open Source components to deliver the best monitoring solution for today's demanding organizational requirements.
Designed for scalability and flexibility, XI is designed to make problematic IT monitoring tasks simple, while retaining the powerful attributes of its enterprise-class foundation blocks.
You can monitoring a complete network along with your servers including, DNS, DHCP, active directory, web server and many more. NagiosXI is free and you and its completely Linux based. There are Virtual machines available on the website that you just need to copy and start and you will be in control.
Nagios XI is a product built upon Nagios Core (the open source offering) that really makes Nagios much easier to use and configure, due to its nice PHP front-end and some really slick sugarcoating.
Nagios XI does what Nagios Core does: it monitors hosts and services. Hosts can be almost anything: a router, remote Linux server, a remote Windows system, a web site. The services that can be monitored are impressive: ping responses, memory usage, CPU usage, bandwidth usage, whether a website has changed content, whether a particular service is available (e.g. SMTP, HTTP, DHCP, etc.) and a lot more. Nagios, both Core and XI, is impressive.
Download Nagios XI from Here
Source: nagios.com