next, we won't talk about a few tools, these tools around from the command prompt and allowing a minister to check on the status of their network.
First thing is, I pick and pick I P config is a Windows Command, whereas I have config is a UNIX or Lennox command.
Here's an example of why I pick and fig looks on a Windows machine With I p config, you're able to look at the I P address, whether it's version for version six and possibly some of the computers names with my P config. You have some variations. For example, you could type I picking pigs based four slash all and will show the status of every neck
that you have on that computer.
And it's look up is a command that allows you to check the I. P address of a name. For example, If you type in s look up
and then type www dot google dot com, you're able to see the I P addresses that are associated with google dot com X a n s. Look up. You just type exit nets that is in command that allows you to see what is connected to your machine or what? You're sharing out this example. This machine is sharing out six resource is or six other
devices are connected to this machine at this current time,
Our sands, where? Address resolution protocol. And it allows you to find the i P address for a particular Mac address.
Or if you taught our art, you're able to see the Mac address for an I P address. Typically, art is used to clear the cache of a computer so that away you're able to connect to another device. Maybe you're telling Nutting into a device over and over again. If you type our tech B,
you're able to clear that cash
so that the way you can tell that into a new device and it won't keep the resolution that it has if they have the same I p address.
Telling a is a command that lets your remote into a computer
via the command prompt.
It's very summer S S h, but tell Nana is unsecure, whereas sshh it's secure is hardly advised not to use Telenet and instead used sshh.
But if you need to use Telenet, some older devices aren't able to use sshh than you would simply type telling that space the i p address when she talked that you will come to a log on prom where you will present your username and password and then you're inside that device.
They say we won't talk about his documentation. Documentation should be easy to understand, and it should record the responsibilities should also recorded the device configuration. And as changes happen, you should update them. Some shops will have a law where they'll keep certain events that they performed on their network. For example,
I serve it needs to be reloaded well in their log. That will
explain that they reloaded the server with this, that they installed this program and that these air the key is that they use it use in case they ever have to fall back on that.
Try to make sure that your documentation is easy to understand for the next person that might be coming along. System log system Log
records advance on PC A lot of Windows machines. They use the event viewer to record the system log. However, there are other logs out there. If you're ever familiar with active directory, Active directory has a cyst lock and that records events that happened inside of active directory.
Other programs have a lot to SharePoint has its own log, and it records what was happening inside of SharePoint. There are third party programs available that allow you to consolidate these laws so you can
easily read them in one central location without having to go to each application or two each device and read what is happening
and this small a joke. We talked about policy and procedures, system management, best practices, testing techniques and troubleshooting in tools.
I'm just laying on the side. Very IittIe hope you guys like a lot.