Category Archives: Network

How to Assign a Static IP Address in Windows 7, 8, XP, or Vista – KB10391687


How to Assign a Static IP Address in Windows 7, 8, XP, or Vista

When organizing your home network it’s easier to assign each computer it’s own IP address than using DHCP. Here we will take a look at doing it in XP, Vista, Windows 7, Windows 8 and Windows 8.1.

If you have a home network with several computes and devices, it’s a good idea to assign each of them a specific address. If you use DHCP (Dynamic Host Configuration Protocol), each computer will request and be assigned an address every time it’s booted up. When you have to do troubleshooting on your network, it’s annoying going to each machine to figure out what IP they have.

Using Static IPs prevents address conflicts between devices and allows you to manage them more easily. Assigning IPs to Windows is essentially the same process, but getting to where you need to be varies between each version.

Windows 7 or Windows 8.x

To change the computer’s IP address in Windows 7, type network and sharing into the Search box in the Start Menu and select Network and Sharing Center when it comes up. If you are in Windows 8.x it will be on the Start Screen itself, like the screenshot at the top of this article.

1start menu

Then when the Network and Sharing Center opens, click on Change adapter settings. This will be the same on Windows 7 or 8.x.


Right-click on your local adapter and select Properties.

3local area connection

In the Local Area Connection Properties window highlight Internet Protocol Version 4 (TCP/IPv4)then click the Properties button.


Now select the radio button Use the following IP address and enter in the correct IP, Subnet mask, and Default gateway that corresponds with your network setup. Then enter your Preferred and Alternate DNS server addresses. Here we’re on a home network and using a simple Class C network configuration and Google DNS.

Check Validate settings upon exit so Windows can find any problems with the addresses you entered. When you’re finished click OK.


Now close out of the Local Area Connections Properties window.


Windows 7 will run network diagnostics and verify the connection is good. Here we had no problems with it, but if you did, you could run the network troubleshooting wizard.


Now you can open the command prompt and do an ipconfig  to see the network adapter settings have been successfully changed.


Windows Vista

Changing your IP from DHCP to a Static address in Vista is similar to Windows 7, but getting to the correct location is a bit different. Open the Start Menu, right-click on Network, and select Properties.


The Network and Sharing Center opens…click on Manage network connections.


Right-click on the network adapter you want to assign an IP address and click Properties.


Highlight Internet Protocol Version 4 (TCP/IPv4) then click the Properties button.


Now change the IP, Subnet mask, Default Gateway, and DNS Server Addresses. When you’re finished click OK.


You’ll need to close out of Local Area Connection Properties for the settings to go into effect.


Open the Command Prompt and do an ipconfig to verify the changes were successful.


Windows XP

In this example we’re using XP SP3 Media Center Edition and changing the IP address of the Wireless adapter.

To set a Static IP in XP right-click on My Network Places and select Properties.


Right-click on the adapter you want to set the IP for and select Properties.


Highlight Internet Protocol (TCP/IP) and click the Properties button.


Now change the IP, Subnet mask, Default Gateway, and DNS Server Addresses. When you’re finished click OK.


You will need to close out of the Network Connection Properties screen before the changes go into effect.


Again you can verify the settings by doing an ipconfig in the command prompt. In case you’re not sure how to do this, click on Start then Run.


In the Run box type in cmd and click OK.


Then at the prompt type in ipconfig and hit Enter. This will show the IP address for the network adapter you changed.


If you have a small office or home network, assigning each computer a specific IP address makes it a lot easier to manage and troubleshoot network connection problems.

Computer has lost trust relationship with the Domain – KB10391592


Error “Security database does not have a computer account for this trust relationship”

Description:  Client cannot log into their computer and get an error about trust relationship with the domain.

Common customer description: I can’t log into my computer.

Probing questions:

Were you able to log in before?
When did this start?

Steps to isolate: If the computer has lost its trust relationship the easiest way to verify is to check Active Directory (Computers) and see if the computers hostname is listed.  If it isn’t listed then follow the next steps.

Steps to resolve:

1: Have the client unplug the network cable.
2: Have the client log into the computer with the network cable unplugged.
3: Once the client is logged in have them reconnect the network cable.
4: Get connected to the clients computer via G2A or LogMeIn
5: After getting connected make sure a user account has a local administrators account.

(Steps to add a user account to local administrators group)
1: Go into control panel
2: Open Administrative Tools
3: Double click Computer Management
4: Expand Local Users and Groups
5: Click on Users
6: Right mouse click in an open area and left mouse click New User
7: Add a user account with a password
8: After added right mouse click on the new user and left mouse click on Properties
9: Click on Member Of tab
10: Click on Add and in the new box type in Administrators (Please note you will need to type out the entire name) and click Ok
11: Feel free to add Remote Desktop Users as well (Please note you will need to type out the entire name)
12: Close all windows you opened.

(Finish up removing and adding the computer to the domain)
6: Right mouse click on Computer and left mouse click on Properties.
7: Click on Change Settings.
8: Under the Computer Name tab click on Change.
9: Record the domain name the computer is trying to connect to.
10: Switch it from Domain to Workgroup and type in Workgroup.
11: Use the new user account credentials when prompted.
12: Reboot the computer when prompted.
13: Tell the client NOT to log into the computer and let you log in as the new user.
14: After you have logged in remove the computer from the Workgroup and place it back on the domain.
15: Reboot when prompted.
16: Have the client log in after the computer reboots and verify everything is working as it normally should.

Additional considerations: If this still does not allow the computer back onto the domain you can try all the steps mentioned above once again.  But after you have placed the computer on the Workgroup and rebooted try changing the computer name.  Example: Bobs-pc change to Bobs-pc1

Then try placing the computer back on to the domain.  Sometimes Active Directory locks out the original computer name but this rarely happens.


Common Command Line Commands – KB1039998


Common Command Line Commands
* Any of these commands can also use the switch /? for help inside Command Line. *
** Not all of these commands need to be run in an Administrator Command Line, but it is suggested to always run CMD as Admin. **
*** There may be additional switches for these commands. These are just the most commonly used switches. ***
Start Command Prompt – Start -> in search field, type “cmd” without quotes -> right click and click Run as Administrator

1. Ping – Sends a request packet to the target host and waits for a response. It will then display the response in the Command Line window. Usage:

  • ping IpAddress
  • ping ComputerName.DomainName.Local – Does not always need to have .DomainName.Local. If there are issues with pinging via ComputerName, try the Fully Qualified Domain Name.
  • ping ComputerNameOrIpAddress -t – Sends a continuous ping to the device until you cancel it with CTRL+C.
  • ping ComputerNameOrIpAddress -4 – If pings are coming back using IPv6, use the -4 switch to only get IPv4 addresses back.

2. IP Config – Gathers IP information of the device running the command. Common switches are:

  • ipconfig – Displays IP address, subnet mask, and default gateway for each adapter.
  • ipconfig /all – Displays the full TCP/IP configuration for all adapters.
  • ipconfig /flushdns – Clears the DNS resolver cache.
  • ipconfig /registerdns – Initiates manual registration for DNS names.
  • ipconfig /release – Messages the DHCP server to release the IP address configuration. Check with Tier 2 before using this command. You will lose all communication to the computer this is run on.
  • ipconfig /renew – Messages the DHCP to renew IP address configuration.

3. System File Checker – Scans for corruptions in system files and restores corrupted or missing files. Usage:

  • sfc /scannow

4. QWinsta – Displays information about Terminal Sessions. Look for the username of the account that you need to log off and keep in mind the ID of the user. Usage:

  • qwinsta -server ServerNameOrIpAddress

5. RWinsta – Sends commands to the remote session. Use the ID number in order to log off the user that the ID number belongs to. Usage:

  • rwinsta -server ComputerNameOrIpAddress IdNumber

6. NSLookup – Tests and troubleshoots DNS servers. Usage:

  • nslookup – Displays information about the Default DNS server.
  • set type=mx – After you use nslookup, you can specify which records you are looking for. After you set the type, enter the domain name.

7. Telnet – Text oriented communication using a virtual terminal connection. Usage:

  • telnet IpAddressDomainNameOrComputerName PortNumber – telnet 25. This will test the connection from your computer to on port 25.

8. System Info – Displays the system’s information in Command Line. Usage:

  • systeminfo | more – You can view system uptime, Operating system, and System Manufacturer.

9. Check Disk – Creates and displays a status report for a disk. Usage:

  • chkdsk (/f /r) – Do not use parenthisis. Chkdsk by itself will display the status report. Using /f will fix errors on the disk. Using /r will locate bad sectors and recover readable data. Both switches will require the computer to be rebooted and will run before boot. This will require approval before using these switches.

10. Shutdown – Initiates a shutdown command. Usage:

  • shutdown.exe /m ComputerNameOrIpAddress /f /r /t 0 /d p:0:0 – Shuts the computer down and forces (/f) the logoff and a reboot (/r) instantly (specified by /t TimeInSeconds) while sending a report to the system (/d p:0:0) saying it is a planned shutdown. You only need to specify /m ComputerNameOrIpAddress if you are attempting to shut down a remote computer.

11. Net Stat – Displays incoming and outgoing connections. Usage:

  • netstat -an – The -a switch displays all active connections and ports on which the computer is listening. The -n switch displays active connections.
  • netstat -an | find “PortNumber” – Finds all connections that are using the specified port.

12. NBT Stat – Helps troubleshoot NetBIOS name resolution problems. Usage:

  • nbtstat -an IpAddress – Useful tool if you know the IP address of a computer but not the name. This will  return the name and MAC address of the device.

13. Change Directory – Changes the directory of the Command Line to wherever you specify. Usage:

  • DriveLetter: – If you need to change the Command Line to a different drive, use this command.    Example:      c:     will change it to the C: drive.
  • cd c:usersUserName – Changes the Command Line to c:usersUserName.

14. Trace Route – Displays the route information and transit delays to a specific address. Usage:

  • tracert DomainNameOrIpAddress – You will see a list of hops that it takes to get to the destination. If anything fails, you will see where in the route it is failing.

15. Task List – Displays all processes the computer is currently running. Usage:

  • tasklist – Displays process name, process ID, session name, session number, and memory usage. You will only need to look at the process name (Image Name) and process ID (PID).

16. Task Kill – Kills whichever task you specify. Usage:

  • taskkill /switch – /PID PID specifies which process ID you want to kill. /IM ImageName specificies which image name you want to kill. Examples:
    taskkill /pid 2000
    taskkill /im chrome.exe

17. W32TM – Diagnose, view, and change Windows Time information.

  • w32tm /config /update – Updates current time configuration if there were any changes made.
  • w32tm /resync – Resynchronizes computer’s time as soon as possible.
  • To change Windows Time Server, on PDC, run w32tm /config /syncfromflags:manual /,,, You will then need to run w32tm /config /update on the PDC and any device that needs time updated, or you can reboot the machines.

18. Remote Desktop Connection – Connects your computer to a remote computer. Usage:

  • mstsc /switch – Mstsc will start remote desktop. If you add any switches, they can help with the look/layout of the connection window. /F (full screen) is the most common switch. /Console can be used if you cannot connect normally.
  • Example: mstsc /f /console

19. Net Start and Net Stop – Starts or stops services by service name. Usage:

  • netstart ServiceName – Starts service.
  • netstop ServiceName – Stops service.
  • && – Runs multiple commands as soon as possible without delay. Example: net stop explorer.exe && net start explorer.exe.

20. VSS Admin – Manages the Volume Shadow Copy Service. Usage:

  • vssadmin list writers – Lists all subscribed volume shadow copy writers on the system. This can be helpful when troubleshooting backups issues.

Common default device passwords KB1039638


Common default device passwords:

Comcast Modem/Firewall – USER cusadmin – PASS – highspeed

Ricoh Printers:

USER admin – PASS admin
USER admin – PASS (leave blank)
USER admin – PASS 123456
USER admin – PASS 1234567
USER admin – PASS 12345678

Konica Minolta Printers:

USER admin – PASS admin
USER admin – PASS (leave blank)
USER admin – PASS 123456
USER admin – PASS 1234567
USER admin – PASS 12345678

LinkSys Router Long List:

Model Username Password
WAP11 n/a  (none) 
DSL n/a  admin 
EtherFast Cable/DSL ROuter Administrator  admin 
Linksys Router DSL/Cable (none)  admin 
BEFW11S4 1 admin  (none) 
BEFSR41 2 (none)  admin 
WRT54G admin  admin 
WAG54G admin  admin 
ap 1120 n/a  (none) 
Linksys DSL n/a  admin 
WAP54G 2 (none)  admin 
WRT54G All Revisions (none)  admin 
model WRT54GC compact wireless-G broadband router (none)  admin 
AG 241 – ADSL2 Gateway with 4-Port Switch admin  admin 
Comcast Comcast-supplied comcast  1234 
WAG54GS admin  admin 
rv082 admin  (none) 
WRT54GS V4 admin  admin 
WAG354G 2 admin  admin 
wag354g admin  admin 
BEFW11S4 2 (none)  admin 
WRT54Gv4 blank  admin 
BEFDSR41W blank  admin 
BEFSR11 blank  admin 
BEFSRU31 blank  admin 
BEFSR41v2 blank  admin 
BEFSR81 blank  admin 
WAG54G blank  admin 
BEFSX41 blank  admin 
BEFVP41 blank  admin 
WRT54G blank  admin 
WRT55AG blank  admin 
BEFN2PS4 blank  admin 
BEFSR41v1.40.2 blank  admin 
BEFSR41-v3-v4-v5 blank  admin 
BEFW11S4v1.50.10 blank  admin 
BEFW11S4v1.50.14 blank  admin 
RT31P2 blank  admin 
WRK54G blank  admin 
WRT51AB blank  admin 
WRT54Gv1.1 blank  admin 
WRT54Gv2.04 blank  admin 
WRV54G blank  admin 
BEFW11S4 blank  admin 
BEFW11P1 blank  admin 
RTP300 admin  admin 
WRT54Gv2.02.7 blank  admin 
BEFW11S4v1.50.11 blank  admin 
BEFSX41v1.50 blank  admin 
WRT54GX blank  admin 
WRT54GS blank  admin 
WRT55AGv2 blank  admin 
RV082 admin  admin 
WAG54GX2 linksys  blank 
WRT54GP2 admin  admin 
WUSB54GS admin  admin 
WRT54GC admin  admin 
WRT54GSv4 admin  admin 
BEFW11S4v4 blank  admin 
befw11s4v2 blank  admin 
WRP200   admin 
WCG200 blank  admin 
WAG54GS   admin 
RT41-BU   admin 
AG241 admin  admin 
WRTP54G admin  admin 
FON-WRT54GL none  admin 
WRT54GL blank  admin 
WAG54G-XW blank  admin 
BEFW11S4v3.2 blank  admin 
WRT54GP2A-AT admin  admin 
WRT54GX4 blank  admin 
WRT300N blank  admin 
WAG354Gv2 admin  admin 
WCG200v2 blank  admin 
WRT54Gv5-DDWRTv23SP2 root  admin 
BEFSR81v2 blank  admin 
WRT54GR blank  admin 
WRT54GXv2 blank  admin 
BEFSR81v3 blank  admin 
WAG300N admin  admin 
WAG200G admin  admin 
SPA-2100 user  primus 
SPA-2102 admin  password 
WRT54Gv5 blank  admin 
BEFSR41 admin  admin 
WAG54Gv2 blank  admin 
WRT350N blank  admin 
befws1s4 blank  admin 
AM300 admin  admin 
WRT150N blank  admin 
WAG54Gv3 linksys  blank 
WRT54Gv2-DDWRTv23SP2 root  admin 
SPA-3102 admin  password 
AM200 admin  admin 
WAG325N admin  admin 
WRT54G3G blank  admin 
BEFCMUH4 unknown  unknown 
WRT330N admin  admin 
WRT54G-TM blank  admin 
WRT310N blank  admin 
WRT160N blank  admin 
BEFSR11v2 admin  admin 
WRT54G2 admin  admin 
WRT100 blank  admin 
WRT600N unknown  unknown 
WAG160N admin  admin 
WRTU54G-TM admin  admin 
AG300 admin  admin 
WRV200 unknown  unknown 
WRT610N blank  admin 
WRVS4400N admin  admin 
HR200 blank  admin 
WRT110 blank  admin 
WAG54GP2 blank  admin 
WRT54GX2 blank  admin 
WAG54G2 admin  admin 
WRT400N admin  admin 
WRT320N admin  admin 
WRH54G blank  admin 
WRT54GS2 admin  admin 
WRT120N admin  admin 
WRT160Nv2 blank  admin 
WRT160NL admin  admin 
E2000 admin  admin 
E3000 admin  admin 
WRT54GH admin  admin 
WRT310Nv2 admin  admin 
DD-WRT_v24-SP2 root  admin 
WRP400 admin  admin 
WRT160Nv3 admin  admin 
E1000 admin  admin 
WRT54GLv4.30 admin  admin 
E4200 admin  admin 
E3200 admin  admin 
E1550 admin  admin 
E1200 admin  admin 
E1500 admin  admin 
E2100L admin  admin 
E2500 admin  admin 
WRT54AG blank  admin 
WRT54G3G-AT admin  admin 
WRT54G3G-ST admin  admin 
WRT54G3GV2-ST admin  admin 
WRTSL54GS admin  admin 
EA4500 admin  admin 
EA3500 admin  blank 
EA2700 admin  blank 
E900 admin  blank 
WZR-HP-AG300H_DD-WRT_v24SP2-MULTI root  admin 
BEFVP41v2 admin  admin 
BEFW11S4v4-1.50 blank  admin 
HG200 blank  admin 
NR041-NetworkEverywhere blank  admin 
RT41P2-AT blank  admin 
RV016 admin  admin 
RV042 admin  admin 
RVS4000 admin  admin 
SPA-9000 admin  password 
UTA200-TM blank  admin 
WAG120N admin  admin 
WAG160Nv2 admin  admin 
WAG320N admin  admin 
WAG54G2-NL admin  admin 
WRT150 blank  admin 
WRT150N-PT blank  admin 
WRT160Nv2-NL admin  admin 
WRT310N-ES blank  admin 
WRT350Nv2 blank  admin 
WRT54G3GV2-VF admin  admin 
WRT54GSv3 blank  admin 
WRT54GSv5 blank  admin 
WRT54GSv6 blank  admin 
WRT54Gv2 blank  admin 
WRT54Gv3 blank  admin 
WRT54Gv8 blank  admin 
WRT610Nv2 admin  admin 
WRTP54G-ER admin  admin 
WRV54Gv2 blank  admin 
WTR54GS admin  admin 
X2000 admin  blank 
BEFSX41v1.52 blank  admin 
BEFSX41v1.44 blank  admin 
BEFW11S4v4-1.52 blank  admin 
RV082v1.1 admin  admin 
WAG54Gv1.01 blank  admin 
WRT110v1.0.05 blank  admin 
WRT54G2v1.5 admin  admin 
WRV54Gv2.36 blank  admin

For most NETGEAR devices (except ReadyNAS/ReadyDATA products and Fully Managed Switches), the default username and password are :

  • Username (all models) = admin
  • Password (current models) = password
  • Password (very old models) = 1234

For ReadyNAS/ReadyDATA products :

  • Username (all models) = admin
  • Password (latest models) = password
  • Password (older models/firmwares) = netgear1
  • Password (very old models/firmwares) = infrant1

For NETGEAR Fully Managed Switches :

  • Username = admin
  • Password is blank (no need to enter any password).

Belkin Router Long List:

Model Username Password
F5D6130 (none)  MiniAP 
F5D7150 FB n/a  admin 
F5D9230-4 admin  admin 
F5D5230-4 Admin  blank 
F5D5231-4v3   blank 
F5D7231-4P NONE  blank 
F5D5231-4 NONE  blank 
F5D6231-4 NONE  blank 
F5D7130UK blank  blank 
F5D6230-3 NONE  blank 
F5D7630 NONE  blank 
F5D6231-4-v2 NONE  blank 
F5D7230-4 NONE  blank 
F5D7231-4 NONE  blank 
F5D5730au admin  password 
F5D7632-4 blank  blank 
F5D7633-4 blank  blank 
F1PI241ENau NONE  admin 
F5D8230-4 blank  blank 
F5D7632ef4a NONE  blank 
F5D7230-4v7.01   blank 
F5D7231-4v4.05 NONE  blank 
F5D8630-4   blank 
F1PI-241EGau NONE  admin 
F5D8231-4 blank  blank 
F5D9630-4   blank 
F5D7632-4v3   blank 
F5D7633-4v2   blank 
F5D7630-4 NONE  blank 
MyEssentials-ME1004-R blank  blank 
F5D9230-4v2   blank 
F5D8233-4 blank  blank 
F5D8631-4   blank 
F5D5630au4 unknown  unknown 
F5D8633-4 blank  blank 
F6D3230-4   blank 
F5D7010   blank 
F5D8232-4   blank 
FD730-4 blank  blank 
F5D7633au4A   blank 
F5D9630-4v2 blank  blank 
F5D9630-4v3 blank  blank 
F5D5230-4v2   blank 
F5D8632-4   blank 
F1PI242ENau blank  admin 
F5D8236-4 blank  blank 
F5D9231-4 blank  blank 
F5D8235-4   blank 
F1PI242EGau blank  admin 
WRTR-159G none  blank 
F5D7234-4 none  blank 
F6D4230-4 none  blank 
F5D8635au4A none  blank 
F5D8636-4 none  none 
F5D8636uk4A none  none 
F7D1301v1   blank 
F5D8233-4v3 blank  blank 
F5D7234-4v3 blank  blank 
F5D8235-4v2   blank 
F5D8231-4v2   blank 
F5D8631-4v3   blank 
F5D8232-4v2   blank 
F5D9230-4v5111   blank 
F7D4301v1   blank 
F7D4302v1   blank 
F7D4401v1   blank 
F7D2301v1   blank 
F7D8302v1   blank 
F7D2401v1   blank 
F1P1242EGau admin  admin 
F7D5301v1 blank  blank 
F7D1401v1   blank 
F7D3301v1   blank 
F7D3302v1   blank 
F5D8635-4v1   blank 
F7D8301v1   blank 
F9K1102v1   blank 
F9K1003v1   blank 
F9K1103v1 none  blank 
F5D8235-4v3   blank 
F9K1001v1   blank 
F5D8236-4v3   blank 
F9J1102v1   blank 
F9J1002v1   blank 
F5D7234-4v4   blank 
F5D9231-4v1 blank  blank 
F9K1002v3   blank 
F5D7234-4v1   blank 
F9K1105v1   blank 
F6D4230-4v2   blank 
F9K1002v1   blank 
F9K1102v2   blank 
F7D7301v1   blank 
F6D4260-4v3   blank 
F9K1002v4   blank 
F1PI243EGau admin  admin 
F1PI24EGau admin  admin 
F1Pl242ENau admin  admin 
F5D7230-4v4   blank 
F5D7230-4v8   blank 
F5D7231-4v2 NONE  blank 
F5D7231-4v5 NONE  blank 
F5D7633-4Av1 blank  blank 
F5D8231-4v4   blank 
F5D8233-4v1 blank  blank 
F5D8235-4v1   blank 
F5D8236-4v1 blank  blank 
F5D8630-4Av1   blank 
F5D8632-4v1   blank 
F5D8633-4v1 blank  blank 
F5D8636-4v1 none  none 
F5D9230-4v5   blank 
F5D9231-4v2 blank  blank 
F5D9630-4A   blank 
F6D4230-4v3   blank 
F6D4230-4v1 none  blank 
FSD7230-4   blank 
ME1004-R blank  blank 
WRTR-159Gv1 none  blank 
F1P1243EGau-iiNet none  blank 
F5D7634-4 none  blank 
F7D3402v1   blank 
F9K1001v3   blank 
F9K1002v5 none  blank 
F5D7234-4v5   blank 
F9K1117v2 admin  admin 
F9J1004v1 admin  admin 
F9K1110 none  blank 

Cisco Router Long List:

Model Username Password
Cache Engine admin  diamond 
ConfigMaker cmaker  cmaker 
cva 122 admin  admin 
CNR All admin  changeme 
Netranger/secure IDS netrangr  attack 
BBSM 5.0 and 5.1 bbsd-client  changeme2 
BBSD MSDE Client 5.0 and 5.1 bbsd-client  NULL 
BBSM Administrator 5.0 and 5.1 Administrator  changeme 
Netranger/secure IDS 3.0(5)S17 root  attack 
BBSM MSDE Administrator 5.0 and 5.1 sa  (none) 
Catalyst 4000/5000/6000 All (none)  public/private/secret 
PIX firewall (none)  cisco 
VPN Concentrator 3000 series 3 admin  admin 
Content Engine admin  default 
3600 Administrator  admin 
AP1200 IOS Cisco  Cisco 
GSR admin  admin 
CiscoWorks 2000 guest  (none) 
CiscoWorks 2000 admin  cisco 
Ciso Aironet 1100 series Rev. 01 (none)  Cisco 
2600 Administrator  admin 
Aironet (none)  _Cisco 
Aironet Cisco  Cisco 
HSE root  blender 
HSE hsa  hsadb 
WLSE root  blender 
WLSE wlse  wlsedb 
Aironet 1200 root  Cisco 
CallManager admin  admin 
WSLE all wlseuser  wlsepassword 
WLSE all enable  (none) 
Cisco Wireless Location Appliance 2700 Series prior to root  password 
MeetingPlace technician  2 + last 4 of Audio Server chasis Serial case-sensitive + 561384 
ONS all CISCO15  otbu+1 
2600 router cisco  (none) 
PIX 6.3 enable  (none) 
Cisco677 NONE  blank 
Cisco678 NONE  blank 
Cisco675 NONE  blank 
Cisco800Series NONE  blank 
DPC2325 unknown  unknown 
EPC2425 blank  blank 
EPC3825 unknown  unknown 
Linksys-E3000 admin  admin 
Linksys-E2000 admin  admin 
DPQ3925 admin  admin 
Linksys-E1000 admin  admin 
870_Series admin  admin 
EPC3925 unknown  unknown 
M10 admin  admin 
Linksys-E1550 admin  admin 
DPC3825 cusadmin  password 
Linksys-E1200 admin  admin 
Linksys-E1500 admin  admin 
Linksys-E2100L admin  admin 
Linksys-E2500 admin  admin 
Linksys-E3200 admin  admin 
Linksys-E4200 admin  admin 
Linksys-EA4500 admin  admin 
Linksys-EA3500 admin  blank 
Linksys-X2000 admin  blank 
M20 admin  blank 
Linksys-E900 admin  blank 
Linksys-X3000 admin  blank 
WRVS4400Nv2 unknown  unknown 
X2000 admin  blank 
X3000 admin  blank 
Linksys-EA2700 admin  blank 
RV-120W admin  admin 
RV180 admin  admin 
DPC2320 blank  blank 
DPC3925 blank  blank 
DPC3828D blank  blank 

Windows Network Discovery won’t stay on KB1039350


Description:  Windows Network Discovery won’t stay on

Common customer description:

“Cannot view computers on the network even after we try turning on Network Discovery.”

Probing questions:

When did this start happening?
Is it just you or everyone?
Any changes made lately?
Any odd pop-ups or “weird” activity on the computer that isn’t there normally?

Steps to isolate:

Remotely connect to computer.
Check the Windows Firewall Advanced settings inbound and outbound port settings.  Are they all listed?

Steps to resolve:

If the customers computer has been or is infected the infection very well could have removed much needed default firewall port settings.  Under the “Group” heading you should have “Network Discovery” among several others.  If it is missing it needs to be repaired.  Click on Restore Default Policy.


If you receive an Error 3 or Error 5 you will need to run ServicesRepair.exe from ESET.  This tool restores the default settings and replaces the missing port rules.  After it has finished it will ask to reboot the computer.  After the reboot everything should now be back in working order.  Test by turning on “Network Discovery” and also check Windows Firewall Advanced Settings to see if the rules have returned.  If all is as it should be you are finished.  If still not working consult a Tier 2.

Additional considerations:

VPN Client Setup – The Basics KB1039291


VPN Client Setup

Windows VPN CLients
Cisco IPSec
Cisco SSL
Sonicwall IPSec
Sonicwall SSL

Cisco IPSec
Cisco SSL
Sonicwall SSL

What is VPN?
Virtual Private Network. Communicates from remote network to private network.

Why do we need it?
Securely access computers, files, connecting Outlook to Exchange remotely.

How do I set it up?
There are several different VPN clients to use.

What info is needed?
Local user or domain login, public IP/domain name, VPN group name, pre-shared key, username, and password.

Authentication methods
LDAP – Allows applications running on almost any platform to obtain directory info.
RADIUS – Authenticates to a RADIUS server installed on Active Directory.
Local Accounts – Uses local user accounts on the firewall itself.

When is it billable?
VPN client installs are non-billable. Troubleshooting connections are billable.

Public vs Private IPs
There are static and dynamic addresses.
Public IPs face outward to the internet.
Private IPs are for internal networks.

PCF files
Profile Configuration File. Automatically configures VPN client when imported.

Transmission Control Protocol (TCP) is a connection-oriented protocol.
User Datagram Protocol (UDP) is a connectionless protocol.
TCP will wait for information if it gets lost during delivery. UDP will not.

VPN Process
How the connection process unfolds

Establishing a connection


Try the VPN connection on your computer

Group issues

The client only partially installs
Check to see if there is an error code
Uninstall the client
Clear temp files
Remove other VPN clients*

Status stuck on “Connecting”
Ping Public IP or VPN domain name
New ISP or other ISP issue
Connectivity at remote location
Office down

Same subnet
192.168.0.x on both remote and office locations

See if their AV blocks communication
Trend Micro

See if their firewall blocks communication
Windows Firewall

Find out if ports are blocked
Open Command Prompt
Type telnet PublicIPAddress port



Common VPN ports
TCP 1723
TCP 1701
UDP 500
TCP 4500

Allow inbound and outbound ports
Start > Control Panel > Windows Firewall > Advanced Settings > Inbound Rules (or Outbound Rules) >
New Rule > Select Port > Click Next > Select which protocol (TCP or UDP) > Select Specific local ports > Type port or port range > Click Next > Select Allow the connection > Click Next > Select Domain, Private, and Public > Click Next > Name the rule > Click Finish >








Cannot get past the group name or username screen
Check spelling
Case sensitive usernames
Verify username
Reset password

VPN connects, but there is no access to anything

Same subnet or wrong subnet
192.168.0.x on both office and remote locations
APIPA address – 169.254.x.x

Connect by IP or Fully Qualified Domain Name
Servername.domain.local instead of servername

Reinstall the VPN client.
Remove VPN client

Consult Tier 2
Less common issues (Example: DNE Update for Cisco)
Firewall configuration

Connecting to a firewall

Find the information to connect to a firewall


Put the IP address into a browser
May need to specify https:// and/or port number
Common ports: 8080 and 4443.



Picture14 Picture15 Picture16

Multiple consoles

Setting up a local user in the firewall

Local versus AD accounts


LDAP not supported
Few users allowed
Not using Active Directory
ADPreferred authorization method
Less hassle on user’s end

Connect to Sonicwall Navigate to:
Users > Local Users > Add User… > Enter username and password > Go to Groups tab >


Check Groups – Everyone, Trusted Users, and VPN
Highlight group name

Click the right arrow below to send it to Member Of:
Go to VPN Access tab


Go to VPN Access tab
Find “Firewalled Subnets” under Networks and Highlight it
Click the right arrow below to send it to the Access List
Click OK


Connect to Cisco Navigate to:
Remote Access VPN
AAA/Local Users
Local Users
Click Add
Enter username and password
Set privilege to No ASDM, SSH, Telnet, or Console access
Click OK
Click Apply
Click Save


Cisco Meraki
Escalate to Tier 2

Domain User Setup
Setting up or modifying a domain user
Active Directory

Suggested account setup
Username = (First initial of first name)(last name)
Password = Password1

Password settings
Uncheck all settings


Picture22 Picture23

Uses Routing and Remote Access
Active Directory group
Dial-in tab
Local firewall user


VPNs on laptops

Will not affect work functionality

How users might ask
“I need to get to my folders”
Could mean desktop folders (RDP)
Could mean server folders (Mapped Drives)

Can they access the resources they were calling in about?

Windows Sonicwall SSL Setup KB1039287


Windows Sonicwall SSL Setup

1. Install the client.
a. With some setups, you can go to a website in a browser, login with network username/password, and download the client. This will automatically set up the client for connection. Skip to step 4.

2. Find the information to connect

3. Creating a new connection

a. Open Sonicwall NetExtender client.
b. Enter the Public IP or fully qualified domain name.
c. Enter username/password.
d. Enter domain name.



4. Attempt connection.
a. Click Connect.
b. You should now be connected. Depending on how the client would like to use their VPN, we may need to set up an RDP connection, mapped drives, Outlook, etc.

Windows Sonicwall IPSec Setup KB1039282


Windows Sonicwall IPSec Setup

1. Install the client.
a. There are 32 bit and 64 bit versions. Be sure that the VPN client version matches the OS version. Go to Start -> right click Computer -> Properties -> System -> System type.

2. Find the information to connect

3. Creating a new connection

a. Open Sonicwall Global VPN Client
b. Click the + sign for a new connection
a. Click Next. Make sure Remote Access is selected. Click Next
b. Enter the Public IP or fully qualified domain name. Give the connection a name. Click Next.
c. Click Finish.


4. Attempt connection.
a. Highlight the connection. Click Enable.
b. Enter pre-shared key.
c. Enter credentials.
d. You should now be connected. Depending on how the client would like to use their VPN, we may need to set up an RDP connection, mapped drives, Outlook, etc.


MAC Sonicwall SSL Setup KB1039278


Mac Sonicwall SSL

1. Find the information to connect

2. Install the client.
a. With some setups, you can go to a website in a browser, login with network username/password, and download the client. This will automatically set up the client for connection. Skip to step 4.
b. Client can be found in the App Store under Sonicwall Mobile Connect. It is free to download.

3. Creating a new connection
a. Open Sonicwall NetExtender client.
b. Click Add Connection.
c. Enter the display name of the connection.
d. Enter the Public IP or fully qualified domain name. Click Next.
e. Enter username/password.
f. Enter domain name. Click Save.


4. Attempt connection.
a. Click Connect.
b. You should now be connected. Depending on how the client would like to use their VPN, we may need to set up an RDP connection, mapped drives, Outlook, etc.

Windows VPN PPTP Setup KB1039263


Windows VPN Settings

Start > Control Panel > Network and Sharing Center > choose “Setup a new connection or network”


Then choose “Connect to a workplace”


You may be prompted to use a connection that you already have. Choose “No, create a new connection”
Next you need to choose “Use my internet connection (VPN)”

Now you will need to enter the Internet Address. In our case it is, and check the box at the bottom “Don’t connect now, just set it up so I can connect later”


You will then be prompted for a Username/Password/Domain. We can just leave these blank for the time being. Click “Create”
Locate the VPN we just created under Start > Control Panel > Network and Sharing > Look in the top left for “Change adapter settings”


Now find the VPN you just created. Right click on the VPN and create a shortcut ( will be placed on the desktop)


Locate your VPN icon on the desktop and double click it.


Fill out the username, password ( these are the same credentials the users would use to log into their desktops) and the domain.


Then choose Properties on that window. On the top of the properties box you will have a couple tabs. Choose the “Security” tab and make sure the Type of VPN: Is Point to Point Tunneling Protocol.


That is all you will have to do to configure the VPN on a new workstation. BUT we still need to give the new user rights to access the network remotely.
To give a user rights to use the VPN log into the SR2k8 Server with admin rights and open Active Directory Users and Computers. ( Start menu -> Administrative tools)
Expand SRWeidema.local, then expand “My Business”, expand “Users”, then expand “SBSUSERS” and locate the user we want to allow VPN rights and double click their name.


This will open the Properties for that user. Under the properties menu you need to select the “Dial In” tab and check “Allow access”


That is it! The user Paul Carter now has access to use our VPN with his credentials.