<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://mars.merhot.dk/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Heth</id>
		<title>Teknologisk videncenter - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://mars.merhot.dk/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Heth"/>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php/Special:Contributions/Heth"/>
		<updated>2026-05-05T09:39:45Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.29.0</generator>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Cyber_Security_Portal&amp;diff=41728</id>
		<title>Cyber Security Portal</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Cyber_Security_Portal&amp;diff=41728"/>
				<updated>2026-04-30T08:59:42Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to the Cyber Security Portal. This portal consists of entries to main articles regarding IT Security and Cyber Security.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-valign=top&lt;br /&gt;
&amp;lt;!----------------------------- Cyber Security -------------------------------&amp;gt;&lt;br /&gt;
|width=&amp;quot;200&amp;quot;|{{FrontpageBox&lt;br /&gt;
|colorcombination = 11&lt;br /&gt;
|headline = Cyber Security&lt;br /&gt;
|bgcolor  = transparent&lt;br /&gt;
|bottombox = https://samsik.dk/&lt;br /&gt;
|picture  = lists.png&lt;br /&gt;
|content  =&lt;br /&gt;
{{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 11&lt;br /&gt;
 |title = Definitions&lt;br /&gt;
 }}&lt;br /&gt;
*[[Cyber Security]]&lt;br /&gt;
*[https://www.kaspersky.com/resource-center/definitions Kaspersky definitions]&lt;br /&gt;
{{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 11&lt;br /&gt;
 |title = Educations&lt;br /&gt;
 }}&lt;br /&gt;
*[[Cisco CyberOps Associate]]&lt;br /&gt;
*[[CCNP Security]]&lt;br /&gt;
*&lt;br /&gt;
:*&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;!----------------------------- CISCO MAIN ARTICLES -------------------------------&amp;gt;&lt;br /&gt;
{{FrontpageBox&lt;br /&gt;
|colorcombination = 5&lt;br /&gt;
|picture  = fileshare.png&lt;br /&gt;
|headline = Cisco Main&lt;br /&gt;
|bgcolor  = transparent&lt;br /&gt;
|bottombox = [http://cisco.netacad.net Cisco Netacademy] [http://cisco.com/tac Cisco TAC]&lt;br /&gt;
|content  =&lt;br /&gt;
 {{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 5&lt;br /&gt;
 |title = Services&lt;br /&gt;
 }}&lt;br /&gt;
*&lt;br /&gt;
 {{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 5&lt;br /&gt;
 |title = Cool Cisco Links&lt;br /&gt;
 }}&lt;br /&gt;
&lt;br /&gt;
*[http://www.cisco.com/en/US/support/tsd_most_requested_tools.html Cisco most used tools]&lt;br /&gt;
{{Source cli}} &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;!----------------------------- BEST PRACTICE-------------------------------&amp;gt;&lt;br /&gt;
|width=&amp;quot;200&amp;quot;|{{FrontpageBox&lt;br /&gt;
|colorcombination = 7&lt;br /&gt;
|headline = Best practice&lt;br /&gt;
|bgcolor  = transparent&lt;br /&gt;
|picture  = agt_web.png&lt;br /&gt;
|content  =&lt;br /&gt;
 {{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 7 &lt;br /&gt;
 |title = Organisations&lt;br /&gt;
 }}&lt;br /&gt;
*[[NIST]]&lt;br /&gt;
*[[ISO and IEC]]&lt;br /&gt;
 {{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 7 &lt;br /&gt;
 |title = Route manipultation&lt;br /&gt;
 }}&lt;br /&gt;
*&lt;br /&gt;
 {{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 7&lt;br /&gt;
 |title = First Hop Redundancy Protocols&lt;br /&gt;
 }}&lt;br /&gt;
*&lt;br /&gt;
{{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 7&lt;br /&gt;
 |title = VPN&lt;br /&gt;
}}&lt;br /&gt;
*[[IPSec VTI Cisco IOS]]&lt;br /&gt;
*[[IPsec Cisco IOS]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;!--------------------------- NETWORKING TOOLS -------------------------&amp;gt;&lt;br /&gt;
{{FrontpageBox&lt;br /&gt;
|colorcombination = 6&lt;br /&gt;
|headline = Networking Tools&lt;br /&gt;
|bgcolor  = transparent&lt;br /&gt;
|picture  = Knetconfig.png&lt;br /&gt;
|content  =&lt;br /&gt;
 {{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 6 &lt;br /&gt;
 |title = Servers&lt;br /&gt;
 }}&lt;br /&gt;
*[[Cisco_Packet_Tracer]]&lt;br /&gt;
*[http://www.solarwinds.com/products/freetools/free_tftp_server.aspx TFTP-server for Windows]&lt;br /&gt;
 {{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 6 &lt;br /&gt;
 |title = Collections&lt;br /&gt;
 }}&lt;br /&gt;
*[http://www.cisco.com/en/US/support/tsd_most_requested_tools.html Cisco most used tools]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;!----------------------------- SWITCHING -------------------------------&amp;gt;&lt;br /&gt;
|width=&amp;quot;200&amp;quot;|{{FrontpageBox&lt;br /&gt;
|colorcombination = 9&lt;br /&gt;
|headline = Switching&lt;br /&gt;
|bgcolor  = transparent&lt;br /&gt;
|picture  = RJ45_transparent.png&lt;br /&gt;
|picturesize=50&lt;br /&gt;
|content  =&lt;br /&gt;
 {{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 9 &lt;br /&gt;
 |title = VLAN and Trunking&lt;br /&gt;
 }}&lt;br /&gt;
*[[VLAN Cisco IOS]]&lt;br /&gt;
*[[VLAN Trunk Cisco IOS]]&lt;br /&gt;
*[[IEEE 802.1Q]]&lt;br /&gt;
*[[VTP]]&lt;br /&gt;
*[[Netband Project - Private Vlan|Private Vlan]]&lt;br /&gt;
 {{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 9 &lt;br /&gt;
 |title = Spanning Tree&lt;br /&gt;
 }}&lt;br /&gt;
*[[Spanning tree]]&lt;br /&gt;
*[[Spanning Tree protocol history]]&lt;br /&gt;
*[[RPVST+]]&lt;br /&gt;
*[[STP Toolkit Cisco IOS]]&lt;br /&gt;
 {{FrontpageBox/subject&lt;br /&gt;
 |colorcombination    = 9 &lt;br /&gt;
 |title =Other subjects&lt;br /&gt;
 }}&lt;br /&gt;
*[[Errdisable Cisco IOS]]&lt;br /&gt;
*[[EtherChannel]]&lt;br /&gt;
*[[Ethernet PoE]]&lt;br /&gt;
*[[Dot1x authentication]]&lt;br /&gt;
*[[Netband Project - IP Source Guard|IP Source Guard]]&lt;br /&gt;
*[[Netband Project - DHCP Snooping|DHCP Snooping]]&lt;br /&gt;
*[[Errdisable Cisco IOS]]&lt;br /&gt;
*[[Netband Project - Dynamic Arp Inspection|Dynamic Arp Inspection]]&lt;br /&gt;
*[[DHCP spoof attack]]&lt;br /&gt;
*[[MAC address flooding]]&lt;br /&gt;
*[[Switch port mirroring]]&lt;br /&gt;
}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Security]][[Category:Cyber Security]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41727</id>
		<title>TPM</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41727"/>
				<updated>2026-04-01T16:07:46Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* tmp2_getcap - capabilities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==TPM - Trusted Platform Module==&lt;br /&gt;
&lt;br /&gt;
==(tpm2_tools (Linux)==&lt;br /&gt;
=== tmp2_getcap - capabilities===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
heth@tpm2:~$ sudo tpm2_getcap  -l&lt;br /&gt;
- algorithms&lt;br /&gt;
- commands&lt;br /&gt;
- pcrs&lt;br /&gt;
- properties-fixed&lt;br /&gt;
- properties-variable&lt;br /&gt;
- ecc-curves&lt;br /&gt;
- handles-transient&lt;br /&gt;
- handles-persistent&lt;br /&gt;
- handles-permanent&lt;br /&gt;
- handles-pcr&lt;br /&gt;
- handles-nv-index&lt;br /&gt;
- handles-loaded-session&lt;br /&gt;
- handles-saved-session&lt;br /&gt;
heth@tpm2:~$ sudo tpm2_getcap pcrs&lt;br /&gt;
selected-pcrs:&lt;br /&gt;
  - sha1: [ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23 ]&lt;br /&gt;
  - sha256: [ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23 ]&lt;br /&gt;
heth@tpm2:~$ sudo tpm2_getcap ecc-curves&lt;br /&gt;
TPM2_ECC_NIST_P256: 0x3&lt;br /&gt;
TPM2_ECC_BN_P256: 0x10&lt;br /&gt;
heth@tpm2:~$&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==endorsement key (EK)==&lt;br /&gt;
A TPM2 Endorsement Key (EK) Certificate is a digital certificate, usually burned into the Trusted Platform Module (TPM) chip during manufacturing, that validates the authenticity of the TPM's unique endorsement key (&lt;br /&gt;
). It acts as a trusted, hardware-backed identity, allowing external parties to verify that a device uses a genuine TPM. &lt;br /&gt;
&lt;br /&gt;
===Key details about the EK Certificate:===&lt;br /&gt;
;Purpose: The EK is an RSA or ECC key pair used to verify the TPM's legitimacy. The private key never leaves the TPM, ensuring security.&lt;br /&gt;
;Issuer: It is typically signed by the TPM manufacturer's certificate authority (CA), certifying the TPM's legitimacy.&lt;br /&gt;
;Use Cases: It is critical for Remote Attestation, where a server checks the EK certificate to ensure a client device has a real, untampered TPM before sharing secrets.&lt;br /&gt;
;Accessing the Certificate: EK certificates can be found in the TPM’s Non-Volatile (NV) memory or retrieved from manufacturer web servers (like Intel's) using specialized tools.&lt;br /&gt;
;Difference from other Keys: Unlike the Storage Root Key (SRK), the EK is permanent. It is not used for signing operations, but for encryption.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
 heth@tpm2:~$ sudo tpm2_getekcertificate | od -h&lt;br /&gt;
0000000 8230 9c04 8230 8403 03a0 0102 0202 7604&lt;br /&gt;
0000020 e292 3095 060d 2a09 4886 f786 010d 0b01&lt;br /&gt;
0000040 0005 8130 3183 300b 0609 5503 0604 0213&lt;br /&gt;
0000060 4544 2131 1f30 0306 0455 0c0a 4918 666e&lt;br /&gt;
....&lt;br /&gt;
0003640 b7c4 c27d 04da 3c75 c145 a234 e32b c20f&lt;br /&gt;
0003660 9cff 006c&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://github.com/microsoft/ms-tpm-20-ref/tree/main Microsoft Official TPM 2.0 Reference Implementation] (Includes TPM2 Simulator)&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41726</id>
		<title>TPM</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41726"/>
				<updated>2026-04-01T16:07:30Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* tmp2_getcap - capabilities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==TPM - Trusted Platform Module==&lt;br /&gt;
&lt;br /&gt;
==(tpm2_tools (Linux)==&lt;br /&gt;
=== tmp2_getcap - capabilities===&lt;br /&gt;
heth@tpm2:~$ sudo tpm2_getcap  -l&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
- algorithms&lt;br /&gt;
- commands&lt;br /&gt;
- pcrs&lt;br /&gt;
- properties-fixed&lt;br /&gt;
- properties-variable&lt;br /&gt;
- ecc-curves&lt;br /&gt;
- handles-transient&lt;br /&gt;
- handles-persistent&lt;br /&gt;
- handles-permanent&lt;br /&gt;
- handles-pcr&lt;br /&gt;
- handles-nv-index&lt;br /&gt;
- handles-loaded-session&lt;br /&gt;
- handles-saved-session&lt;br /&gt;
heth@tpm2:~$ sudo tpm2_getcap pcrs&lt;br /&gt;
selected-pcrs:&lt;br /&gt;
  - sha1: [ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23 ]&lt;br /&gt;
  - sha256: [ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23 ]&lt;br /&gt;
heth@tpm2:~$ sudo tpm2_getcap ecc-curves&lt;br /&gt;
TPM2_ECC_NIST_P256: 0x3&lt;br /&gt;
TPM2_ECC_BN_P256: 0x10&lt;br /&gt;
heth@tpm2:~$&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==endorsement key (EK)==&lt;br /&gt;
A TPM2 Endorsement Key (EK) Certificate is a digital certificate, usually burned into the Trusted Platform Module (TPM) chip during manufacturing, that validates the authenticity of the TPM's unique endorsement key (&lt;br /&gt;
). It acts as a trusted, hardware-backed identity, allowing external parties to verify that a device uses a genuine TPM. &lt;br /&gt;
&lt;br /&gt;
===Key details about the EK Certificate:===&lt;br /&gt;
;Purpose: The EK is an RSA or ECC key pair used to verify the TPM's legitimacy. The private key never leaves the TPM, ensuring security.&lt;br /&gt;
;Issuer: It is typically signed by the TPM manufacturer's certificate authority (CA), certifying the TPM's legitimacy.&lt;br /&gt;
;Use Cases: It is critical for Remote Attestation, where a server checks the EK certificate to ensure a client device has a real, untampered TPM before sharing secrets.&lt;br /&gt;
;Accessing the Certificate: EK certificates can be found in the TPM’s Non-Volatile (NV) memory or retrieved from manufacturer web servers (like Intel's) using specialized tools.&lt;br /&gt;
;Difference from other Keys: Unlike the Storage Root Key (SRK), the EK is permanent. It is not used for signing operations, but for encryption.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
 heth@tpm2:~$ sudo tpm2_getekcertificate | od -h&lt;br /&gt;
0000000 8230 9c04 8230 8403 03a0 0102 0202 7604&lt;br /&gt;
0000020 e292 3095 060d 2a09 4886 f786 010d 0b01&lt;br /&gt;
0000040 0005 8130 3183 300b 0609 5503 0604 0213&lt;br /&gt;
0000060 4544 2131 1f30 0306 0455 0c0a 4918 666e&lt;br /&gt;
....&lt;br /&gt;
0003640 b7c4 c27d 04da 3c75 c145 a234 e32b c20f&lt;br /&gt;
0003660 9cff 006c&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://github.com/microsoft/ms-tpm-20-ref/tree/main Microsoft Official TPM 2.0 Reference Implementation] (Includes TPM2 Simulator)&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41725</id>
		<title>TPM</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41725"/>
				<updated>2026-04-01T16:07:07Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* (tpm2_tools (Linux) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==TPM - Trusted Platform Module==&lt;br /&gt;
&lt;br /&gt;
==(tpm2_tools (Linux)==&lt;br /&gt;
=== tmp2_getcap - capabilities===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
- algorithms&lt;br /&gt;
- commands&lt;br /&gt;
- pcrs&lt;br /&gt;
- properties-fixed&lt;br /&gt;
- properties-variable&lt;br /&gt;
- ecc-curves&lt;br /&gt;
- handles-transient&lt;br /&gt;
- handles-persistent&lt;br /&gt;
- handles-permanent&lt;br /&gt;
- handles-pcr&lt;br /&gt;
- handles-nv-index&lt;br /&gt;
- handles-loaded-session&lt;br /&gt;
- handles-saved-session&lt;br /&gt;
heth@tpm2:~$ sudo tpm2_getcap pcrs&lt;br /&gt;
selected-pcrs:&lt;br /&gt;
  - sha1: [ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23 ]&lt;br /&gt;
  - sha256: [ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23 ]&lt;br /&gt;
heth@tpm2:~$ sudo tpm2_getcap ecc-curves&lt;br /&gt;
TPM2_ECC_NIST_P256: 0x3&lt;br /&gt;
TPM2_ECC_BN_P256: 0x10&lt;br /&gt;
heth@tpm2:~$&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==endorsement key (EK)==&lt;br /&gt;
A TPM2 Endorsement Key (EK) Certificate is a digital certificate, usually burned into the Trusted Platform Module (TPM) chip during manufacturing, that validates the authenticity of the TPM's unique endorsement key (&lt;br /&gt;
). It acts as a trusted, hardware-backed identity, allowing external parties to verify that a device uses a genuine TPM. &lt;br /&gt;
&lt;br /&gt;
===Key details about the EK Certificate:===&lt;br /&gt;
;Purpose: The EK is an RSA or ECC key pair used to verify the TPM's legitimacy. The private key never leaves the TPM, ensuring security.&lt;br /&gt;
;Issuer: It is typically signed by the TPM manufacturer's certificate authority (CA), certifying the TPM's legitimacy.&lt;br /&gt;
;Use Cases: It is critical for Remote Attestation, where a server checks the EK certificate to ensure a client device has a real, untampered TPM before sharing secrets.&lt;br /&gt;
;Accessing the Certificate: EK certificates can be found in the TPM’s Non-Volatile (NV) memory or retrieved from manufacturer web servers (like Intel's) using specialized tools.&lt;br /&gt;
;Difference from other Keys: Unlike the Storage Root Key (SRK), the EK is permanent. It is not used for signing operations, but for encryption.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
 heth@tpm2:~$ sudo tpm2_getekcertificate | od -h&lt;br /&gt;
0000000 8230 9c04 8230 8403 03a0 0102 0202 7604&lt;br /&gt;
0000020 e292 3095 060d 2a09 4886 f786 010d 0b01&lt;br /&gt;
0000040 0005 8130 3183 300b 0609 5503 0604 0213&lt;br /&gt;
0000060 4544 2131 1f30 0306 0455 0c0a 4918 666e&lt;br /&gt;
....&lt;br /&gt;
0003640 b7c4 c27d 04da 3c75 c145 a234 e32b c20f&lt;br /&gt;
0003660 9cff 006c&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://github.com/microsoft/ms-tpm-20-ref/tree/main Microsoft Official TPM 2.0 Reference Implementation] (Includes TPM2 Simulator)&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41724</id>
		<title>TPM</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41724"/>
				<updated>2026-04-01T10:49:33Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* (tpm2_tools (Linux)= */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==TPM - Trusted Platform Module==&lt;br /&gt;
&lt;br /&gt;
==(tpm2_tools (Linux)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==endorsement key (EK)==&lt;br /&gt;
A TPM2 Endorsement Key (EK) Certificate is a digital certificate, usually burned into the Trusted Platform Module (TPM) chip during manufacturing, that validates the authenticity of the TPM's unique endorsement key (&lt;br /&gt;
). It acts as a trusted, hardware-backed identity, allowing external parties to verify that a device uses a genuine TPM. &lt;br /&gt;
&lt;br /&gt;
===Key details about the EK Certificate:===&lt;br /&gt;
;Purpose: The EK is an RSA or ECC key pair used to verify the TPM's legitimacy. The private key never leaves the TPM, ensuring security.&lt;br /&gt;
;Issuer: It is typically signed by the TPM manufacturer's certificate authority (CA), certifying the TPM's legitimacy.&lt;br /&gt;
;Use Cases: It is critical for Remote Attestation, where a server checks the EK certificate to ensure a client device has a real, untampered TPM before sharing secrets.&lt;br /&gt;
;Accessing the Certificate: EK certificates can be found in the TPM’s Non-Volatile (NV) memory or retrieved from manufacturer web servers (like Intel's) using specialized tools.&lt;br /&gt;
;Difference from other Keys: Unlike the Storage Root Key (SRK), the EK is permanent. It is not used for signing operations, but for encryption.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
 heth@tpm2:~$ sudo tpm2_getekcertificate | od -h&lt;br /&gt;
0000000 8230 9c04 8230 8403 03a0 0102 0202 7604&lt;br /&gt;
0000020 e292 3095 060d 2a09 4886 f786 010d 0b01&lt;br /&gt;
0000040 0005 8130 3183 300b 0609 5503 0604 0213&lt;br /&gt;
0000060 4544 2131 1f30 0306 0455 0c0a 4918 666e&lt;br /&gt;
....&lt;br /&gt;
0003640 b7c4 c27d 04da 3c75 c145 a234 e32b c20f&lt;br /&gt;
0003660 9cff 006c&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://github.com/microsoft/ms-tpm-20-ref/tree/main Microsoft Official TPM 2.0 Reference Implementation] (Includes TPM2 Simulator)&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41723</id>
		<title>TPM</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41723"/>
				<updated>2026-04-01T10:49:23Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==TPM - Trusted Platform Module==&lt;br /&gt;
&lt;br /&gt;
=(tpm2_tools (Linux)==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==endorsement key (EK)==&lt;br /&gt;
A TPM2 Endorsement Key (EK) Certificate is a digital certificate, usually burned into the Trusted Platform Module (TPM) chip during manufacturing, that validates the authenticity of the TPM's unique endorsement key (&lt;br /&gt;
). It acts as a trusted, hardware-backed identity, allowing external parties to verify that a device uses a genuine TPM. &lt;br /&gt;
&lt;br /&gt;
===Key details about the EK Certificate:===&lt;br /&gt;
;Purpose: The EK is an RSA or ECC key pair used to verify the TPM's legitimacy. The private key never leaves the TPM, ensuring security.&lt;br /&gt;
;Issuer: It is typically signed by the TPM manufacturer's certificate authority (CA), certifying the TPM's legitimacy.&lt;br /&gt;
;Use Cases: It is critical for Remote Attestation, where a server checks the EK certificate to ensure a client device has a real, untampered TPM before sharing secrets.&lt;br /&gt;
;Accessing the Certificate: EK certificates can be found in the TPM’s Non-Volatile (NV) memory or retrieved from manufacturer web servers (like Intel's) using specialized tools.&lt;br /&gt;
;Difference from other Keys: Unlike the Storage Root Key (SRK), the EK is permanent. It is not used for signing operations, but for encryption.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
 heth@tpm2:~$ sudo tpm2_getekcertificate | od -h&lt;br /&gt;
0000000 8230 9c04 8230 8403 03a0 0102 0202 7604&lt;br /&gt;
0000020 e292 3095 060d 2a09 4886 f786 010d 0b01&lt;br /&gt;
0000040 0005 8130 3183 300b 0609 5503 0604 0213&lt;br /&gt;
0000060 4544 2131 1f30 0306 0455 0c0a 4918 666e&lt;br /&gt;
....&lt;br /&gt;
0003640 b7c4 c27d 04da 3c75 c145 a234 e32b c20f&lt;br /&gt;
0003660 9cff 006c&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://github.com/microsoft/ms-tpm-20-ref/tree/main Microsoft Official TPM 2.0 Reference Implementation] (Includes TPM2 Simulator)&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41722</id>
		<title>TPM</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41722"/>
				<updated>2026-04-01T10:48:36Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* tpm2_tools (Linux) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=TPM - Trusted Platform Module=&lt;br /&gt;
&lt;br /&gt;
=tpm2_tools (Linux)=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=endorsement key (EK)=&lt;br /&gt;
A TPM2 Endorsement Key (EK) Certificate is a digital certificate, usually burned into the Trusted Platform Module (TPM) chip during manufacturing, that validates the authenticity of the TPM's unique endorsement key (&lt;br /&gt;
). It acts as a trusted, hardware-backed identity, allowing external parties to verify that a device uses a genuine TPM. &lt;br /&gt;
&lt;br /&gt;
==Key details about the EK Certificate:==&lt;br /&gt;
;Purpose: The EK is an RSA or ECC key pair used to verify the TPM's legitimacy. The private key never leaves the TPM, ensuring security.&lt;br /&gt;
;Issuer: It is typically signed by the TPM manufacturer's certificate authority (CA), certifying the TPM's legitimacy.&lt;br /&gt;
;Use Cases: It is critical for Remote Attestation, where a server checks the EK certificate to ensure a client device has a real, untampered TPM before sharing secrets.&lt;br /&gt;
;Accessing the Certificate: EK certificates can be found in the TPM’s Non-Volatile (NV) memory or retrieved from manufacturer web servers (like Intel's) using specialized tools.&lt;br /&gt;
;Difference from other Keys: Unlike the Storage Root Key (SRK), the EK is permanent. It is not used for signing operations, but for encryption.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
 heth@tpm2:~$ sudo tpm2_getekcertificate | od -h&lt;br /&gt;
0000000 8230 9c04 8230 8403 03a0 0102 0202 7604&lt;br /&gt;
0000020 e292 3095 060d 2a09 4886 f786 010d 0b01&lt;br /&gt;
0000040 0005 8130 3183 300b 0609 5503 0604 0213&lt;br /&gt;
0000060 4544 2131 1f30 0306 0455 0c0a 4918 666e&lt;br /&gt;
....&lt;br /&gt;
0003640 b7c4 c27d 04da 3c75 c145 a234 e32b c20f&lt;br /&gt;
0003660 9cff 006c&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://github.com/microsoft/ms-tpm-20-ref/tree/main Microsoft Official TPM 2.0 Reference Implementation] (Includes TPM2 Simulator)&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41721</id>
		<title>TPM</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41721"/>
				<updated>2026-04-01T10:48:17Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=TPM - Trusted Platform Module=&lt;br /&gt;
&lt;br /&gt;
=tpm2_tools (Linux)=&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=endorsement key (EK)=&lt;br /&gt;
A TPM2 Endorsement Key (EK) Certificate is a digital certificate, usually burned into the Trusted Platform Module (TPM) chip during manufacturing, that validates the authenticity of the TPM's unique endorsement key (&lt;br /&gt;
). It acts as a trusted, hardware-backed identity, allowing external parties to verify that a device uses a genuine TPM. &lt;br /&gt;
&lt;br /&gt;
==Key details about the EK Certificate:==&lt;br /&gt;
;Purpose: The EK is an RSA or ECC key pair used to verify the TPM's legitimacy. The private key never leaves the TPM, ensuring security.&lt;br /&gt;
;Issuer: It is typically signed by the TPM manufacturer's certificate authority (CA), certifying the TPM's legitimacy.&lt;br /&gt;
;Use Cases: It is critical for Remote Attestation, where a server checks the EK certificate to ensure a client device has a real, untampered TPM before sharing secrets.&lt;br /&gt;
;Accessing the Certificate: EK certificates can be found in the TPM’s Non-Volatile (NV) memory or retrieved from manufacturer web servers (like Intel's) using specialized tools.&lt;br /&gt;
;Difference from other Keys: Unlike the Storage Root Key (SRK), the EK is permanent. It is not used for signing operations, but for encryption.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
 heth@tpm2:~$ sudo tpm2_getekcertificate | od -h&lt;br /&gt;
0000000 8230 9c04 8230 8403 03a0 0102 0202 7604&lt;br /&gt;
0000020 e292 3095 060d 2a09 4886 f786 010d 0b01&lt;br /&gt;
0000040 0005 8130 3183 300b 0609 5503 0604 0213&lt;br /&gt;
0000060 4544 2131 1f30 0306 0455 0c0a 4918 666e&lt;br /&gt;
....&lt;br /&gt;
0003640 b7c4 c27d 04da 3c75 c145 a234 e32b c20f&lt;br /&gt;
0003660 9cff 006c&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://github.com/microsoft/ms-tpm-20-ref/tree/main Microsoft Official TPM 2.0 Reference Implementation] (Includes TPM2 Simulator)&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41720</id>
		<title>TPM</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41720"/>
				<updated>2026-04-01T10:22:01Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=TPM - Trusted Platform Module=&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://github.com/microsoft/ms-tpm-20-ref/tree/main Microsoft Official TPM 2.0 Reference Implementation] (Includes TPM2 Simulator)&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41719</id>
		<title>TPM</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=TPM&amp;diff=41719"/>
				<updated>2026-04-01T10:21:15Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: Created page with &amp;quot;=TPM - Trusted Platform Module=  =Links= *[https://github.com/microsoft/ms-tpm-20-ref/tree/main Microsoft Official TPM 2.0 Reference Implementation] Category:Security&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=TPM - Trusted Platform Module=&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://github.com/microsoft/ms-tpm-20-ref/tree/main Microsoft Official TPM 2.0 Reference Implementation]&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Ssh_reverse_tunnel&amp;diff=41718</id>
		<title>Ssh reverse tunnel</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Ssh_reverse_tunnel&amp;diff=41718"/>
				<updated>2026-04-01T09:29:16Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Remote server */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To ssh to a Linux server behind a firewall that doesn't allow incoming connections, a reverse ssh tunnel can be created from the server to a known client host. The client host should have a static IP address or a DNS hostname.&lt;br /&gt;
&lt;br /&gt;
=Remote server=&lt;br /&gt;
To allow login without password create public/private rsa key pair on the client and copy the private key to the .ssh/authorized_keys file an set mod to 600 &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen&lt;br /&gt;
ssh-copy-id steve@10.10.10.10  #IP of your local, from which you want autoconnect to&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Establishing the reversed tunnel from a scriptfile. You probably needs to install '''autossh'''. &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
#!/usr/bin/bash&lt;br /&gt;
# See: https://medium.com/@souri.rv/autossh-for-keeping-ssh-tunnels-alive-5c14207c6ba9&lt;br /&gt;
REMOTE_HOST=&amp;quot;222.2.2.2&amp;quot;&lt;br /&gt;
REMOTE_PORT=&amp;quot;9000&amp;quot;&lt;br /&gt;
REMOTE_USER=&amp;quot;steve&amp;quot;&lt;br /&gt;
&lt;br /&gt;
autossh -M 0 -gNC $1 -o &amp;quot;ExitOnForwardFailure=yes&amp;quot; -o &amp;quot;ServerAliveInterval=10&amp;quot; -o &amp;quot;ServerAliveCountMax=3&amp;quot; -R ${REMOTE_PORT}:localhost:22 ${REMOTE_USER}@${REMOTE_USER}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
/etc/systemd/system/reversessh.service&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
[Unit]&lt;br /&gt;
Description=Reverse SSH tunnel&lt;br /&gt;
After=network.target&lt;br /&gt;
StartLimitIntervalSec=60&lt;br /&gt;
StartLimitBurst=12&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Service]&lt;br /&gt;
ExecStart=/bin/bash /home/steve/bin/reversessh.sh&lt;br /&gt;
Type=simple&lt;br /&gt;
User=steve&lt;br /&gt;
Group=steve&lt;br /&gt;
Restart=on-failure&lt;br /&gt;
RestartSec=5&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Install]&lt;br /&gt;
WantedBy=default.target&lt;br /&gt;
RequiredBy=network.target&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=local machine=&lt;br /&gt;
On local machine you want to ssh from create ~/bin/sshremote with the following and make it executeable.&lt;br /&gt;
Use it as for example: '''sshremote mars chris'''&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
declare -A hosts&lt;br /&gt;
&lt;br /&gt;
# machinename in /etc/hosts maps to portnumber&lt;br /&gt;
hosts[&amp;quot;mars&amp;quot;]=9999&lt;br /&gt;
hosts[&amp;quot;mbus1&amp;quot;]=9998&lt;br /&gt;
hosts[&amp;quot;mars2&amp;quot;]=9997&lt;br /&gt;
hosts[&amp;quot;dhdc&amp;quot;]=9996&lt;br /&gt;
&lt;br /&gt;
host=$1&lt;br /&gt;
user=$2&lt;br /&gt;
ip=&amp;quot;localhost&amp;quot;&lt;br /&gt;
&lt;br /&gt;
ssh -p ${hosts[${host}]} ${user}@${ip}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*https://qbee.io/misc/reverse-ssh-tunneling-the-ultimate-guide/&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Ssh_reverse_tunnel&amp;diff=41717</id>
		<title>Ssh reverse tunnel</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Ssh_reverse_tunnel&amp;diff=41717"/>
				<updated>2026-04-01T09:28:34Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Remote server */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To ssh to a Linux server behind a firewall that doesn't allow incoming connections, a reverse ssh tunnel can be created from the server to a known client host. The client host should have a static IP address or a DNS hostname.&lt;br /&gt;
&lt;br /&gt;
=Remote server=&lt;br /&gt;
To allow login without password create public/private rsa key pair on the client and copy the private key to the .ssh/authorized_keys file an set mod to 600 &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen&lt;br /&gt;
ssh-copy-id steve@10.10.10.10&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Establishing the reversed tunnel from a scriptfile. You probably needs to install '''autossh'''. &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
#!/usr/bin/bash&lt;br /&gt;
# See: https://medium.com/@souri.rv/autossh-for-keeping-ssh-tunnels-alive-5c14207c6ba9&lt;br /&gt;
REMOTE_HOST=&amp;quot;222.2.2.2&amp;quot;&lt;br /&gt;
REMOTE_PORT=&amp;quot;9000&amp;quot;&lt;br /&gt;
REMOTE_USER=&amp;quot;steve&amp;quot;&lt;br /&gt;
&lt;br /&gt;
autossh -M 0 -gNC $1 -o &amp;quot;ExitOnForwardFailure=yes&amp;quot; -o &amp;quot;ServerAliveInterval=10&amp;quot; -o &amp;quot;ServerAliveCountMax=3&amp;quot; -R ${REMOTE_PORT}:localhost:22 ${REMOTE_USER}@${REMOTE_USER}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
/etc/systemd/system/reversessh.service&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
[Unit]&lt;br /&gt;
Description=Reverse SSH tunnel&lt;br /&gt;
After=network.target&lt;br /&gt;
StartLimitIntervalSec=60&lt;br /&gt;
StartLimitBurst=12&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Service]&lt;br /&gt;
ExecStart=/bin/bash /home/steve/bin/reversessh.sh&lt;br /&gt;
Type=simple&lt;br /&gt;
User=steve&lt;br /&gt;
Group=steve&lt;br /&gt;
Restart=on-failure&lt;br /&gt;
RestartSec=5&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Install]&lt;br /&gt;
WantedBy=default.target&lt;br /&gt;
RequiredBy=network.target&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=local machine=&lt;br /&gt;
On local machine you want to ssh from create ~/bin/sshremote with the following and make it executeable.&lt;br /&gt;
Use it as for example: '''sshremote mars chris'''&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
declare -A hosts&lt;br /&gt;
&lt;br /&gt;
# machinename in /etc/hosts maps to portnumber&lt;br /&gt;
hosts[&amp;quot;mars&amp;quot;]=9999&lt;br /&gt;
hosts[&amp;quot;mbus1&amp;quot;]=9998&lt;br /&gt;
hosts[&amp;quot;mars2&amp;quot;]=9997&lt;br /&gt;
hosts[&amp;quot;dhdc&amp;quot;]=9996&lt;br /&gt;
&lt;br /&gt;
host=$1&lt;br /&gt;
user=$2&lt;br /&gt;
ip=&amp;quot;localhost&amp;quot;&lt;br /&gt;
&lt;br /&gt;
ssh -p ${hosts[${host}]} ${user}@${ip}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*https://qbee.io/misc/reverse-ssh-tunneling-the-ultimate-guide/&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Journalctl&amp;diff=41716</id>
		<title>Journalctl</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Journalctl&amp;diff=41716"/>
				<updated>2026-03-18T13:16:52Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Log from service=&lt;br /&gt;
Example: '''journalctl -u sshguard -S &amp;quot;2026-03-15 00:00:00&amp;quot; -U &amp;quot;2026-03-18 13:36:04&amp;quot;'''&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Journalctl&amp;diff=41715</id>
		<title>Journalctl</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Journalctl&amp;diff=41715"/>
				<updated>2026-03-18T13:16:38Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: Created page with &amp;quot; =Log from service= Example: '''journalctl -u sshguard -S &amp;quot;2026-03-15 00:00:00&amp;quot; -U &amp;quot;2026-03-18 13:36:04&amp;quot;''' Category Linux&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Log from service=&lt;br /&gt;
Example: '''journalctl -u sshguard -S &amp;quot;2026-03-15 00:00:00&amp;quot; -U &amp;quot;2026-03-18 13:36:04&amp;quot;'''&lt;br /&gt;
[[Category Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Kali_Linux&amp;diff=41714</id>
		<title>Kali Linux</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Kali_Linux&amp;diff=41714"/>
				<updated>2026-03-11T12:27:48Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* x11.forwarding session */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Installation: Kali Linux 1.0.6 AMD64&amp;lt;br/&amp;gt;&lt;br /&gt;
apt-get update &amp;amp;&amp;amp; apt-get upgrade&lt;br /&gt;
=Armitage=&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
service postgresql start&lt;br /&gt;
service metasploit start&lt;br /&gt;
armitage&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
svar ja til at starte metasploit&lt;br /&gt;
=NMAP=&lt;br /&gt;
Opdater NSE i NMAP:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
wget -c -r https://svn.nmap.org/nmap/scripts/&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
kopier alle filer fra scrpts folderen til /usr/shares/nmap/scripts &amp;amp; alle filer fra nselib til /usr/shares/nmap/nselib&amp;lt;br/&amp;gt;&lt;br /&gt;
opdater script med '''nmap --script-updatedb'''&lt;br /&gt;
=x11.forwarding session=&lt;br /&gt;
in /etc/ssh/ssh_config uncomment/change under ''Host *''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
 ForwardX11 yes&lt;br /&gt;
 ForwardX11Trusted yes&lt;br /&gt;
&amp;lt;/source&amp;gt; &lt;br /&gt;
restart ssh: ''sudo systemctl restart ssh''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
From terminal emulator supporting X11-fording run: ''xfce4-session''&lt;br /&gt;
'''Note:''' If using mobaXterm under &amp;quot;Settings-&amp;gt;configuration&amp;quot; X11 - change ''X11-server display mode&amp;quot; to &amp;quot;Windowed-mode&amp;quot; (Can freeze in multi-display setups)&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Kali_Linux&amp;diff=41713</id>
		<title>Kali Linux</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Kali_Linux&amp;diff=41713"/>
				<updated>2026-03-11T11:46:59Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Installation: Kali Linux 1.0.6 AMD64&amp;lt;br/&amp;gt;&lt;br /&gt;
apt-get update &amp;amp;&amp;amp; apt-get upgrade&lt;br /&gt;
=Armitage=&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
service postgresql start&lt;br /&gt;
service metasploit start&lt;br /&gt;
armitage&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
svar ja til at starte metasploit&lt;br /&gt;
=NMAP=&lt;br /&gt;
Opdater NSE i NMAP:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
wget -c -r https://svn.nmap.org/nmap/scripts/&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
kopier alle filer fra scrpts folderen til /usr/shares/nmap/scripts &amp;amp; alle filer fra nselib til /usr/shares/nmap/nselib&amp;lt;br/&amp;gt;&lt;br /&gt;
opdater script med '''nmap --script-updatedb'''&lt;br /&gt;
=x11.forwarding session=&lt;br /&gt;
in /etc/ssh/ssh_config uncomment/change under ''Host *''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
 ForwardX11 yes&lt;br /&gt;
 ForwardX11Trusted yes&lt;br /&gt;
&amp;lt;/source&amp;gt; &lt;br /&gt;
restart ssh: ''sudo systemctl restart ssh''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
From terminal emulator supporting X11-fording run: ''xfce4-session''&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Red_Hat_dnf&amp;diff=41712</id>
		<title>Red Hat dnf</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Red_Hat_dnf&amp;diff=41712"/>
				<updated>2026-02-26T06:49:03Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: Created page with &amp;quot;#Redirewct Dnf Red Hat&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#Redirewct [[Dnf Red Hat]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Main_Page&amp;diff=41711</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Main_Page&amp;diff=41711"/>
				<updated>2026-02-03T05:41:23Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;0&amp;quot;&lt;br /&gt;
|[[Image:Kate maleri2.jpg|300px|Artist: Kate Kallermann]]&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot; align=left&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|- align=left&lt;br /&gt;
|Welcome to [http://house-of-technology.dk Teknologisk videncenter's] Wiki at [http://www.mercantec.dk Mercantec], [[wikipedia:en:Viborg,_Denmark|Viborg]], [[wikipedia:en:Denmark|Denmark]]. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
*[http://skema.merhot.dk Lokale-Bookning]&lt;br /&gt;
*[[Booking-guide | Booking af en Virtuel maskine]]&lt;br /&gt;
*[[Evaluering_af_Hovedforløb|Evaluering hovedforløb]]&lt;br /&gt;
*[[Evaluering af AMU]]&lt;br /&gt;
*[https://www.oreilly.com/ O'reilly Books online]&lt;br /&gt;
*[[AMU Netværk]]&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===Valgfri specialefag===&lt;br /&gt;
&amp;lt;hr style=&amp;quot;color:red;background:red;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:1.4em; background:#transparent; color:aabbee;&amp;quot;&amp;gt;BEMÆRK: efterår 2024 katalog udkommet.&amp;lt;/div&amp;gt; &amp;lt;hr style=&amp;quot;color:red;background:red;&amp;quot;&amp;gt;&lt;br /&gt;
*[[media:Valgfri_uddannelsesspecifikke_fag_2024_v.4.pdf |Valgfri  uddannelsesspecifikke fag katalog  efterår 2024]]&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
=== Datahouse Helpdesk ===&lt;br /&gt;
*https://helpdesk@hotdata.dk&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
mail til mailto:hotskp@mercantec.dk&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
__NOEDITSECTION__&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Ssh_reverse_tunnel&amp;diff=41710</id>
		<title>Ssh reverse tunnel</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Ssh_reverse_tunnel&amp;diff=41710"/>
				<updated>2026-01-23T06:11:56Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* local machine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To ssh to a Linux server behind a firewall that doesn't allow incoming connections, a reverse ssh tunnel can be created from the server to a known client host. The client host should have a static IP address or a DNS hostname.&lt;br /&gt;
&lt;br /&gt;
=Remote server=&lt;br /&gt;
To allow login without password create public/private rsa key pair on the client and copy the private key to the .ssh/authorized_keys file an set mod to 600 &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh -o TCPKeepAlive=yes -R 9000:localhost:22 heth@93.166.84.21&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Establishing the reversed tunnel from a scriptfile. You probably needs to install '''autossh'''. &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
#!/usr/bin/bash&lt;br /&gt;
# See: https://medium.com/@souri.rv/autossh-for-keeping-ssh-tunnels-alive-5c14207c6ba9&lt;br /&gt;
REMOTE_HOST=&amp;quot;222.2.2.2&amp;quot;&lt;br /&gt;
REMOTE_PORT=&amp;quot;9000&amp;quot;&lt;br /&gt;
REMOTE_USER=&amp;quot;steve&amp;quot;&lt;br /&gt;
&lt;br /&gt;
autossh -M 0 -gNC $1 -o &amp;quot;ExitOnForwardFailure=yes&amp;quot; -o &amp;quot;ServerAliveInterval=10&amp;quot; -o &amp;quot;ServerAliveCountMax=3&amp;quot; -R ${REMOTE_PORT}:localhost:22 ${REMOTE_USER}@${REMOTE_USER}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
/etc/systemd/system/reversessh.service&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
[Unit]&lt;br /&gt;
Description=Reverse SSH tunnel&lt;br /&gt;
After=network.target&lt;br /&gt;
StartLimitIntervalSec=60&lt;br /&gt;
StartLimitBurst=12&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Service]&lt;br /&gt;
ExecStart=/bin/bash /home/steve/bin/reversessh.sh&lt;br /&gt;
Type=simple&lt;br /&gt;
User=steve&lt;br /&gt;
Group=steve&lt;br /&gt;
Restart=on-failure&lt;br /&gt;
RestartSec=5&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Install]&lt;br /&gt;
WantedBy=default.target&lt;br /&gt;
RequiredBy=network.target&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=local machine=&lt;br /&gt;
On local machine you want to ssh from create ~/bin/sshremote with the following and make it executeable.&lt;br /&gt;
Use it as for example: '''sshremote mars chris'''&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
declare -A hosts&lt;br /&gt;
&lt;br /&gt;
# machinename in /etc/hosts maps to portnumber&lt;br /&gt;
hosts[&amp;quot;mars&amp;quot;]=9999&lt;br /&gt;
hosts[&amp;quot;mbus1&amp;quot;]=9998&lt;br /&gt;
hosts[&amp;quot;mars2&amp;quot;]=9997&lt;br /&gt;
hosts[&amp;quot;dhdc&amp;quot;]=9996&lt;br /&gt;
&lt;br /&gt;
host=$1&lt;br /&gt;
user=$2&lt;br /&gt;
ip=&amp;quot;localhost&amp;quot;&lt;br /&gt;
&lt;br /&gt;
ssh -p ${hosts[${host}]} ${user}@${ip}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*https://qbee.io/misc/reverse-ssh-tunneling-the-ultimate-guide/&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Ssh_reverse_tunnel&amp;diff=41709</id>
		<title>Ssh reverse tunnel</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Ssh_reverse_tunnel&amp;diff=41709"/>
				<updated>2026-01-23T06:08:52Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* local machine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To ssh to a Linux server behind a firewall that doesn't allow incoming connections, a reverse ssh tunnel can be created from the server to a known client host. The client host should have a static IP address or a DNS hostname.&lt;br /&gt;
&lt;br /&gt;
=Remote server=&lt;br /&gt;
To allow login without password create public/private rsa key pair on the client and copy the private key to the .ssh/authorized_keys file an set mod to 600 &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh -o TCPKeepAlive=yes -R 9000:localhost:22 heth@93.166.84.21&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Establishing the reversed tunnel from a scriptfile. You probably needs to install '''autossh'''. &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
#!/usr/bin/bash&lt;br /&gt;
# See: https://medium.com/@souri.rv/autossh-for-keeping-ssh-tunnels-alive-5c14207c6ba9&lt;br /&gt;
REMOTE_HOST=&amp;quot;222.2.2.2&amp;quot;&lt;br /&gt;
REMOTE_PORT=&amp;quot;9000&amp;quot;&lt;br /&gt;
REMOTE_USER=&amp;quot;steve&amp;quot;&lt;br /&gt;
&lt;br /&gt;
autossh -M 0 -gNC $1 -o &amp;quot;ExitOnForwardFailure=yes&amp;quot; -o &amp;quot;ServerAliveInterval=10&amp;quot; -o &amp;quot;ServerAliveCountMax=3&amp;quot; -R ${REMOTE_PORT}:localhost:22 ${REMOTE_USER}@${REMOTE_USER}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
/etc/systemd/system/reversessh.service&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
[Unit]&lt;br /&gt;
Description=Reverse SSH tunnel&lt;br /&gt;
After=network.target&lt;br /&gt;
StartLimitIntervalSec=60&lt;br /&gt;
StartLimitBurst=12&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Service]&lt;br /&gt;
ExecStart=/bin/bash /home/steve/bin/reversessh.sh&lt;br /&gt;
Type=simple&lt;br /&gt;
User=steve&lt;br /&gt;
Group=steve&lt;br /&gt;
Restart=on-failure&lt;br /&gt;
RestartSec=5&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Install]&lt;br /&gt;
WantedBy=default.target&lt;br /&gt;
RequiredBy=network.target&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=local machine=&lt;br /&gt;
On local machine you want to ssh from.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
declare -A hosts&lt;br /&gt;
&lt;br /&gt;
# machinename in /etc/hosts maps to portnumber&lt;br /&gt;
hosts[&amp;quot;mars&amp;quot;]=9999&lt;br /&gt;
hosts[&amp;quot;mbus1&amp;quot;]=9998&lt;br /&gt;
hosts[&amp;quot;mars2&amp;quot;]=9997&lt;br /&gt;
hosts[&amp;quot;dhdc&amp;quot;]=9996&lt;br /&gt;
&lt;br /&gt;
host=$1&lt;br /&gt;
user=$2&lt;br /&gt;
ip=&amp;quot;localhost&amp;quot;&lt;br /&gt;
&lt;br /&gt;
ssh $3 -p ${hosts[${host}]} ${user}@${ip}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*https://qbee.io/misc/reverse-ssh-tunneling-the-ultimate-guide/&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Ssh_reverse_tunnel&amp;diff=41708</id>
		<title>Ssh reverse tunnel</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Ssh_reverse_tunnel&amp;diff=41708"/>
				<updated>2026-01-22T13:27:42Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To ssh to a Linux server behind a firewall that doesn't allow incoming connections, a reverse ssh tunnel can be created from the server to a known client host. The client host should have a static IP address or a DNS hostname.&lt;br /&gt;
&lt;br /&gt;
=Remote server=&lt;br /&gt;
To allow login without password create public/private rsa key pair on the client and copy the private key to the .ssh/authorized_keys file an set mod to 600 &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh -o TCPKeepAlive=yes -R 9000:localhost:22 heth@93.166.84.21&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Establishing the reversed tunnel from a scriptfile. You probably needs to install '''autossh'''. &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
#!/usr/bin/bash&lt;br /&gt;
# See: https://medium.com/@souri.rv/autossh-for-keeping-ssh-tunnels-alive-5c14207c6ba9&lt;br /&gt;
REMOTE_HOST=&amp;quot;222.2.2.2&amp;quot;&lt;br /&gt;
REMOTE_PORT=&amp;quot;9000&amp;quot;&lt;br /&gt;
REMOTE_USER=&amp;quot;steve&amp;quot;&lt;br /&gt;
&lt;br /&gt;
autossh -M 0 -gNC $1 -o &amp;quot;ExitOnForwardFailure=yes&amp;quot; -o &amp;quot;ServerAliveInterval=10&amp;quot; -o &amp;quot;ServerAliveCountMax=3&amp;quot; -R ${REMOTE_PORT}:localhost:22 ${REMOTE_USER}@${REMOTE_USER}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
/etc/systemd/system/reversessh.service&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
[Unit]&lt;br /&gt;
Description=Reverse SSH tunnel&lt;br /&gt;
After=network.target&lt;br /&gt;
StartLimitIntervalSec=60&lt;br /&gt;
StartLimitBurst=12&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Service]&lt;br /&gt;
ExecStart=/bin/bash /home/steve/bin/reversessh.sh&lt;br /&gt;
Type=simple&lt;br /&gt;
User=steve&lt;br /&gt;
Group=steve&lt;br /&gt;
Restart=on-failure&lt;br /&gt;
RestartSec=5&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[Install]&lt;br /&gt;
WantedBy=default.target&lt;br /&gt;
RequiredBy=network.target&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=local machine=&lt;br /&gt;
On local machine you want to ssh from.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
declare -A hosts&lt;br /&gt;
&lt;br /&gt;
# machinename in /etc/hosts maps to portnumber&lt;br /&gt;
hosts[&amp;quot;mars&amp;quot;]=9999&lt;br /&gt;
hosts[&amp;quot;mbus1&amp;quot;]=9998&lt;br /&gt;
hosts[&amp;quot;mars2&amp;quot;]=9997&lt;br /&gt;
hosts[&amp;quot;dhdc&amp;quot;]=9996&lt;br /&gt;
&lt;br /&gt;
host=$1&lt;br /&gt;
user=$2&lt;br /&gt;
ip=&amp;quot;localhost&amp;quot;&lt;br /&gt;
&lt;br /&gt;
echo &amp;quot;Value for $host is ${hosts[${host}]}&amp;quot;&lt;br /&gt;
echo &amp;quot;Value for $host is ${hosts[$host]}&amp;quot;&lt;br /&gt;
set -x&lt;br /&gt;
#ssh -p ${hosts[${host}]} ${user}@${localhost}&lt;br /&gt;
ssh $3 -p ${hosts[${host}]} ${user}@${ip}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=Links=&lt;br /&gt;
*https://qbee.io/misc/reverse-ssh-tunneling-the-ultimate-guide/&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Selinux&amp;diff=41707</id>
		<title>Selinux</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Selinux&amp;diff=41707"/>
				<updated>2025-11-30T06:02:18Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* selinux policy analysis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=selinux policy analysis=&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
dnf install setools-console&lt;br /&gt;
seinfo&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=DAC and MAC=&lt;br /&gt;
* Discretionary access control (DAC)&lt;br /&gt;
**Traditional file/process access rights &lt;br /&gt;
* Mandatory access control (MAC)&lt;br /&gt;
**Selinux&lt;br /&gt;
*See: http://csrc.nist.gov/publications/history/dod85.pdf&lt;br /&gt;
[[Category:Red Hat]][[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Selinux&amp;diff=41706</id>
		<title>Selinux</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Selinux&amp;diff=41706"/>
				<updated>2025-11-29T12:56:46Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* selinux policy analysis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=selinux policy analysis=&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
dnf install setools-console&lt;br /&gt;
seinfo&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Red Hat]][[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Selinux&amp;diff=41705</id>
		<title>Selinux</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Selinux&amp;diff=41705"/>
				<updated>2025-11-29T12:56:32Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* selinux policy analysis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=selinux policy analysis=&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
dnf install setools-console&lt;br /&gt;
seinfo&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Red hat]][[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Selinux&amp;diff=41704</id>
		<title>Selinux</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Selinux&amp;diff=41704"/>
				<updated>2025-11-29T12:55:51Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: Created page with &amp;quot;=selinux policy analysis= &amp;lt;source lang=bash&amp;gt; dnf install setools-console seinfo &amp;lt;/source&amp;gt;  Category:RedhatCategory:Linux&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=selinux policy analysis=&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
dnf install setools-console&lt;br /&gt;
seinfo&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Redhat]][[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Dnf_Red_Hat&amp;diff=41703</id>
		<title>Dnf Red Hat</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Dnf_Red_Hat&amp;diff=41703"/>
				<updated>2025-11-29T07:01:55Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Remember [[sudo]]&lt;br /&gt;
*dnf search foo   # Search for package containing foo in either name or short description&lt;br /&gt;
*dnf list               # List all installed packages&lt;br /&gt;
*dnf list *lib*       # List all files containing lib in its name&lt;br /&gt;
*dnf install foo # Install the package named foo&lt;br /&gt;
==Summary commands==&lt;br /&gt;
[[Image:DNF summary.png|500px|Source:https://learning.oreilly.com/library/view/red-hat-rhcsa/9780138096311/ch09.xhtml#ch09lev1sec04]]&lt;br /&gt;
==dnf groups==&lt;br /&gt;
A group is a collection of packages which typically collects several packages needed by a service, simplifying installation.&lt;br /&gt;
&lt;br /&gt;
To see main groups&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
dnf group list&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
To see additional groups&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
dnf group list hidden&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Install a group - example&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
dnf groupinstall &amp;quot;TeX formatting system&amp;quot;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
==dnf modules==&lt;br /&gt;
Modules allows you to access/install different versions of an application stream. An application stream is a specific version of a module - for example php version 8.1.&lt;br /&gt;
&lt;br /&gt;
Only one application stream can be enables at any given time.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
dnf module list&lt;br /&gt;
...&lt;br /&gt;
dnf module info php:8.1&lt;br /&gt;
...&lt;br /&gt;
 dnf module enable php:8.1&lt;br /&gt;
...&lt;br /&gt;
dnf module install php:8.2&lt;br /&gt;
dnf distro-sync&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
==epel repository ==&lt;br /&gt;
The EPEL (Extra Packages for Enterprise Linux) repository is a popular community-driven repository that provides additional high-quality packages for Red Hat Enterprise Linux (RHEL), CentOS, and other compatible distributions.&lt;br /&gt;
&lt;br /&gt;
The epel release is maintaned by [https://docs.fedoraproject.org/en-US/epel/ Fedora]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
sudo dnf install epel-release&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==Articles==&lt;br /&gt;
*[https://www.redhat.com/sysadmin/how-manage-packages DNF, YUM and/or RPM]&lt;br /&gt;
&lt;br /&gt;
[[Category:Red Hat]][[category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=VXLAN_ubuntu&amp;diff=41702</id>
		<title>VXLAN ubuntu</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=VXLAN_ubuntu&amp;diff=41702"/>
				<updated>2025-11-15T11:51:07Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: Created page with &amp;quot;=Links= *https://scottstuff.net/posts/2024/11/24/vxlan-evpn-ubuntu/ Category:Linux&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Links=&lt;br /&gt;
*https://scottstuff.net/posts/2024/11/24/vxlan-evpn-ubuntu/&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Ss_Linux&amp;diff=41701</id>
		<title>Ss Linux</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Ss_Linux&amp;diff=41701"/>
				<updated>2025-11-06T04:35:43Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Listening sockets */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Listening sockets==&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
heth@dotnet:~$ ss -tulnp&lt;br /&gt;
Netid    State     Recv-Q    Send-Q        Local Address:Port                 Peer Address:Port     Process&lt;br /&gt;
udp      UNCONN    0         0                       127.0.0.54:53              0.0.0.0:*&lt;br /&gt;
udp      UNCONN    0         0                    127.0.0.53%lo:53              0.0.0.0:*&lt;br /&gt;
udp      UNCONN    0         0            192.168.56.112%enp0s8:68              0.0.0.0:*&lt;br /&gt;
udp      UNCONN    0         0            192.168.64.108%enp0s3:68              0.0.0.0:*&lt;br /&gt;
tcp      LISTEN    0         128                    127.0.0.1:6010              0.0.0.0:*&lt;br /&gt;
tcp      LISTEN    0         4096                 127.0.0.53%lo:53              0.0.0.0:*&lt;br /&gt;
tcp      LISTEN    0         4096                       0.0.0.0:22              0.0.0.0:*&lt;br /&gt;
tcp      LISTEN    0         4096                    127.0.0.54:53              0.0.0.0:*&lt;br /&gt;
tcp      LISTEN    0         4096                          [::]:22                 [::]:*&lt;br /&gt;
tcp      LISTEN    0         128                        [::1]:6010                 [::]:*&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Ss_Linux&amp;diff=41700</id>
		<title>Ss Linux</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Ss_Linux&amp;diff=41700"/>
				<updated>2025-11-06T04:35:33Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: Created page with &amp;quot;==Listening sockets== &amp;lt;source lang=bash&amp;gt; heth@dotnet:~$ ss -tulnp Netid    State     Recv-Q    Send-Q        Local Address:Port                 Peer Address:Port     Process u...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Listening sockets==&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
heth@dotnet:~$ ss -tulnp&lt;br /&gt;
Netid    State     Recv-Q    Send-Q        Local Address:Port                 Peer Address:Port     Process&lt;br /&gt;
udp      UNCONN    0         0                       127.0.0.54:53              0.0.0.0:*&lt;br /&gt;
udp      UNCONN    0         0                    127.0.0.53%lo:53              0.0.0.0:*&lt;br /&gt;
udp      UNCONN    0         0            192.168.56.112%enp0s8:68              0.0.0.0:*&lt;br /&gt;
udp      UNCONN    0         0            192.168.64.108%enp0s3:68              0.0.0.0:*&lt;br /&gt;
tcp      LISTEN    0         128                    127.0.0.1:6010              0.0.0.0:*&lt;br /&gt;
tcp      LISTEN    0         4096                 127.0.0.53%lo:53              0.0.0.0:*&lt;br /&gt;
tcp      LISTEN    0         4096                       0.0.0.0:22              0.0.0.0:*&lt;br /&gt;
tcp      LISTEN    0         4096                    127.0.0.54:53              0.0.0.0:*&lt;br /&gt;
tcp      LISTEN    0         4096                          [::]:22                 [::]:*&lt;br /&gt;
tcp      LISTEN    0         128                        [::1]:6010                 [::]:*&lt;br /&gt;
&amp;lt;source&amp;gt;&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Netstat_Linux&amp;diff=41699</id>
		<title>Netstat Linux</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Netstat_Linux&amp;diff=41699"/>
				<updated>2025-11-06T04:29:53Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: Created page with &amp;quot;Replaced with the ss command. category:Linux&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Replaced with the [[ss Linux|ss]] command.&lt;br /&gt;
[[category:Linux]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=GNS3_installation_windows&amp;diff=41698</id>
		<title>GNS3 installation windows</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=GNS3_installation_windows&amp;diff=41698"/>
				<updated>2025-10-13T05:33:52Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#Installer en virtualiseringsplatform&lt;br /&gt;
##Kan være [https://www.virtualbox.org/ VirtualBox], [https://www.vmware.com/products/desktop-hypervisor/workstation-and-fusion VMware Workstation/fusion] eller ESXI eller HyperV&lt;br /&gt;
##Jeg anvender VirtualBox&lt;br /&gt;
# Download [https://www.gns3.com/software/download-vm GNS3-VM] og installer i din virtualiseringsplatform &lt;br /&gt;
# Installer [https://www.gns3.com/software/download GNS3 GUI] på din klient&lt;br /&gt;
## Under preferences server:&lt;br /&gt;
### Fjern fluehak i '''Enable local server'''&lt;br /&gt;
### Protocol: http&lt;br /&gt;
### Host: IP adresse på GNS3 VM&lt;br /&gt;
### Port: 80 TCP&lt;br /&gt;
&lt;br /&gt;
''Bemærk:'' Kan godt drille lidt Se evt. [https://docs.gns3.com/docs/getting-started/installation/windows GNS3 dokumentation]&lt;br /&gt;
&lt;br /&gt;
[[Category:GNS3]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=GNS3_installation_windows&amp;diff=41697</id>
		<title>GNS3 installation windows</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=GNS3_installation_windows&amp;diff=41697"/>
				<updated>2025-10-13T05:33:42Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#Installer en virtualiseringsplatform&lt;br /&gt;
##Kan være [https://www.virtualbox.org/ VirtualBox], [https://www.vmware.com/products/desktop-hypervisor/workstation-and-fusion VMware Workstation/fusion] eller ESXI eller HyperV&lt;br /&gt;
##Jeg anvender VirtualBox&lt;br /&gt;
# Download [https://www.gns3.com/software/download-vm GNS3-VM] og installer i din virtualiseringsplatform &lt;br /&gt;
# Installer [https://www.gns3.com/software/download GNS3 GUI] på din klient&lt;br /&gt;
## Under preferences server:&lt;br /&gt;
### Fjern fluehak i '''Enable local server'''&lt;br /&gt;
### Protocol: http&lt;br /&gt;
### Host: IP adresse på GNS3 VM&lt;br /&gt;
### Port: 80 TCP&lt;br /&gt;
&lt;br /&gt;
''Bemærk:'' Kan godt drille lidt Se evt. [https://docs.gns3.com/docs/getting-started/installation/windows GNS3 dokumentation)&lt;br /&gt;
&lt;br /&gt;
[[Category:GNS3]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=GNS3_installation_windows&amp;diff=41696</id>
		<title>GNS3 installation windows</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=GNS3_installation_windows&amp;diff=41696"/>
				<updated>2025-10-13T05:30:17Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#Installer en virtualiseringsplatform&lt;br /&gt;
##Kan være [https://www.virtualbox.org/ VirtualBox], [https://www.vmware.com/products/desktop-hypervisor/workstation-and-fusion VMware Workstation/fusion] eller ESXI eller HyperV&lt;br /&gt;
##Jeg anvender VirtualBox&lt;br /&gt;
# Download [https://www.gns3.com/software/download-vm GNS3-VM] og installer i din virtualiseringsplatform &lt;br /&gt;
# Installer [https://www.gns3.com/software/download GNS3 GUI] på din klient&lt;br /&gt;
## Under preferences server:&lt;br /&gt;
### Fjern fluehak i '''Enable local server'''&lt;br /&gt;
### Protocol: http&lt;br /&gt;
### Host: IP adresse på GNS3 VM&lt;br /&gt;
### Port: 80 TCP&lt;br /&gt;
&lt;br /&gt;
''Bemærk:'' Kan godt drille lidt &lt;br /&gt;
&lt;br /&gt;
[[Category:GNS3]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=GNS3_installation_windows&amp;diff=41695</id>
		<title>GNS3 installation windows</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=GNS3_installation_windows&amp;diff=41695"/>
				<updated>2025-10-13T05:29:55Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: Created page with &amp;quot;#Installer en virtualiseringsplatform ##Kan være [https://www.virtualbox.org/ VirtualBox], [https://www.vmware.com/products/desktop-hypervisor/workstation-and-fusion VMware W...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#Installer en virtualiseringsplatform&lt;br /&gt;
##Kan være [https://www.virtualbox.org/ VirtualBox], [https://www.vmware.com/products/desktop-hypervisor/workstation-and-fusion VMware Workstation/fusion] eller ESXI eller HyperV&lt;br /&gt;
#Jeg anvender VirtualBox&lt;br /&gt;
# Download [https://www.gns3.com/software/download-vm GNS3-VM] og installer i din virtualiseringsplatform &lt;br /&gt;
# Installer [https://www.gns3.com/software/download GNS3 GUI] på din klient&lt;br /&gt;
## Under preferences server:&lt;br /&gt;
### Fjern fluehak i '''Enable local server'''&lt;br /&gt;
### Protocol: http&lt;br /&gt;
### Host: IP adresse på GNS3 VM&lt;br /&gt;
### Port: 80 TCP&lt;br /&gt;
&lt;br /&gt;
''Bemærk:'' Kan godt drille lidt &lt;br /&gt;
&lt;br /&gt;
[[Category:GNS3]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Uddannelses_Portal&amp;diff=41694</id>
		<title>Uddannelses Portal</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Uddannelses_Portal&amp;diff=41694"/>
				<updated>2025-09-11T05:42:04Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
;BEMÆRK: Der er kommet en ny revision af Datauddannelserne. Se artiklen [[/Datauddannelser Version 8 revision 2011|Datauddannelser Version 8 og version 9]] for beskrivelse&lt;br /&gt;
{|&lt;br /&gt;
|-valign=top&lt;br /&gt;
|&lt;br /&gt;
{{FrontpageBox~&lt;br /&gt;
|colorcombination    = 2&lt;br /&gt;
|picture               = fileshare.png&lt;br /&gt;
|headline            = Datauddannelser - Version 9&lt;br /&gt;
|bgcolor             = transparent&lt;br /&gt;
|bottombox           = House of Technology&lt;br /&gt;
|content             =&lt;br /&gt;
{{FrontpageBox/subject~&lt;br /&gt;
|colorcombination    = 2&lt;br /&gt;
|title = Fagspecialer&lt;br /&gt;
}}&lt;br /&gt;
*[[Lokale Uddannelses Planer|Lokale Uddannelses Planer]]&lt;br /&gt;
*[[DatateknikerV9/svendeprøve drejebog|Datatekniker version 9 Svendeprøve]]&lt;br /&gt;
[https://www.retsinformation.dk/eli/lta/2020/528 BEK nr 528 af 27/04/2020]&lt;br /&gt;
*[[AMU]]&lt;br /&gt;
{{FrontpageBox/subject~&lt;br /&gt;
|colorcombination    = 2&lt;br /&gt;
|title = Fagfordelingsplaner&lt;br /&gt;
}}&lt;br /&gt;
{{FrontpageBox/subject~&lt;br /&gt;
|colorcombination    = 2&lt;br /&gt;
|title = Diverse&lt;br /&gt;
}}&lt;br /&gt;
=Version 10=&lt;br /&gt;
*[https://iu.dk/public/dokumenter/uddannelser/stroem_styring_it/data_og_kommunikation/2017Uddannelsesordning%20for%20data-%20og%20kommunikationsuddannelsen.pdf Uddannelsesordning]&lt;br /&gt;
*[https://uvm.dk/erhvervsuddannelser/proever-og-eksamen/de-afsluttende-proever Afsluttende Prøver]&lt;br /&gt;
*[https://www.retsinformation.dk/eli/lta/2023/312 Bekendtgørelse fra retsinformation fra 22. marts 2023]&lt;br /&gt;
=NOTATER=&lt;br /&gt;
*Version 6-april 2017 [https://www.retsinformation.dk/Forms/R0710.aspx?id=188666 Bekendtgørelse om data- og kommunikationsuddannelsen]&lt;br /&gt;
*Version 9-august 2015 [http://www.uddannelsesadministration.dk/Uddannelsesordninger/22352/Uddannelsesordning%20for%20data-%20og%20kommunikationsuddannelsen.pdf Uddannelsesordning]&lt;br /&gt;
*Version 9-august 2015 [http://www.industriensuddannelser.dk/uddannelser/erhvervsuddannelser/data-ogkommunikationsuddannelsen/datateknikermedspecialeiinfrastruktur/ Industriens uddannelser]&lt;br /&gt;
*[https://www.retsinformation.dk/Forms/R0710.aspx?id=161427 Bekendtgørelse om prøver og eksamen i grundlæggende erhvervsrettede uddannelser]&lt;br /&gt;
*[https://www.retsinformation.dk/Forms/R0710.aspx?id=179825 Bekendtgørelse om erhvervsuddannelser] (Arbejdstid etc)&lt;br /&gt;
&lt;br /&gt;
*[https://www.retsinformation.dk/Forms/R0710.aspx?id=145737 Bekendtgørelse nr 372 af 15/04/2013] (strøm, styring og it)&lt;br /&gt;
*[https://www.retsinformation.dk/forms/r0710.aspx?id=161427 BEK nr 41 af 16/01/2014] (Bekendtgørelse om prøver)&lt;br /&gt;
*[http://www.industriensuddannelser.dk/public/dokumenter/skuemestre/Afsluttende%20pr%F8ver%20datatekniker/pdf/dok2.pdf Retningslinjer for eksamen/svendeprøven Datatekniker]&lt;br /&gt;
**[http://www.industriensuddannelser.dk/public/dokumenter/skuemestre/Afsluttende%20pr%F8ver%20datatekniker/pdf/dok1.pdf Retningslinier anden version 2]&lt;br /&gt;
*[https://www.eud.uddannelsesadministration.dk Uddannelsesordning - fag og målepinde ] &lt;br /&gt;
*[https://www.uvm.dk/Uddannelser/Erhvervsuddannelser/Skoleudvikling/Lokale-undervisningsplaner Lokale Undervisnings Planer]&lt;br /&gt;
}}&lt;br /&gt;
|&lt;br /&gt;
|{{FrontpageBox~&lt;br /&gt;
|colorcombination    = 2&lt;br /&gt;
|picture               = fileshare.png&lt;br /&gt;
|headline            = Datauddannelser - Version 8-2010&lt;br /&gt;
|bgcolor             = transparent&lt;br /&gt;
|bottombox           = House of Technology&lt;br /&gt;
|content             =&lt;br /&gt;
{{FrontpageBox/subject~&lt;br /&gt;
|colorcombination    = 2&lt;br /&gt;
|title = Fagspecialer&lt;br /&gt;
}}&lt;br /&gt;
*[[IT-Supporter Version 8|IT-Supporter]]&lt;br /&gt;
*[[Datatekniker med speciale i programmering Version 8|Datatekniker med speciale i programmering]]&lt;br /&gt;
*[[Datatekniker med speciale i infrastruktur Version 8|Datatekniker med speciale i infrastruktur]]&lt;br /&gt;
*[[Telesystemtekniker Version 8|Telesystemtekniker]]&lt;br /&gt;
*[[Teleinstallationstekniker Version 8|Teleinstallationstekniker]]&lt;br /&gt;
&lt;br /&gt;
{{FrontpageBox/subject~&lt;br /&gt;
|colorcombination    = 2&lt;br /&gt;
|title = Fagfordelingsplaner&lt;br /&gt;
}}&lt;br /&gt;
*[[Fagfordelingsplan Data Version 8/IT-Supporter|Fagfordelingsplan IT-Supporter]]&lt;br /&gt;
*[[Fagfordelingsplan Data Version 8/Datatekniker-programmering|Fagfordelingsplan Datatekniker programmering]]&lt;br /&gt;
*[[Fagfordelingsplan Data Version 8/Datatekniker-infrastruktur|Fagfordelingsplan Datatekniker infrastruktur]]&lt;br /&gt;
*Fagfordelingsplan [[Fagfordelingsplan Data Version 8| Sammenligning]]&lt;br /&gt;
{{FrontpageBox/subject~&lt;br /&gt;
|colorcombination    = 2&lt;br /&gt;
|title = Diverse&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
*[[Valgfrie specialefag Version 8/oversigt|Valgfrie specialefag]]&lt;br /&gt;
----&lt;br /&gt;
*[[IT-Supporter Version 8/Svendeprøve uddrag|Svendeprøve uddrag]] fra bekendtgørelsen&lt;br /&gt;
----&lt;br /&gt;
*[[Evaluering version 8]]&lt;br /&gt;
----&lt;br /&gt;
*Links&lt;br /&gt;
**[https://www.retsinformation.dk/Forms/R0710.aspx?id=131809#B2 Bekendtgørelse nr. 607 af 04/06/2010] Version 8 (Gammel)&lt;br /&gt;
&lt;br /&gt;
**[http://www.uddannelsesadministration.dk/Uddannelsesordninger/14661/Tekstdel%20til%20uddannelsesordning%20for%20Data-%20og%20kommunikationsuddannelsen.pdf Uddannelsesordning] Oversigt&lt;br /&gt;
**[http://eud-adm.dk/Reports/VisRapport.aspx?rapport_navn=UddannelsesordningUdvidet.rpt&amp;amp;rapport_type=1&amp;amp;where_clause={EUDK_UDDORDNING_LRAPPORT_V.REG_ID}%20=%2014661%20And%20{EUDK_UDDORDNING_LRAPPORT_V.UDD_ID}%20=%2016362 Uddannelsesordning] Med fag og målepinde (Gammel)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
|-valign=top&lt;br /&gt;
|{{FrontpageBox~&lt;br /&gt;
|colorcombination    = 3&lt;br /&gt;
|picture               = lists.png&lt;br /&gt;
|headline            = Datauddannelser - Version 7&lt;br /&gt;
|bgcolor             = transparent&lt;br /&gt;
|bottombox           = House of Technology&lt;br /&gt;
|content             = &lt;br /&gt;
{{FrontpageBox/subject~&lt;br /&gt;
|colorcombination    = 3&lt;br /&gt;
|title = Fagspecialer&lt;br /&gt;
}}&lt;br /&gt;
*[[IT-SupporterV7|IT-Supporter]]&lt;br /&gt;
*[[DatateknikerV7|Datatekniker]]  &lt;br /&gt;
*[[KontorserviceteknikerV7|Kontorservicetekniker]]&lt;br /&gt;
*[[TeleinstallationsteknikerV7|Teleinstallationstekniker]] &lt;br /&gt;
*[[TelesystemteknikerV7|Telesystemtekniker]]&lt;br /&gt;
&lt;br /&gt;
{{FrontpageBox/subject~&lt;br /&gt;
|colorcombination    = 3&lt;br /&gt;
|title = Fagfordeling&lt;br /&gt;
}}&lt;br /&gt;
*[[fagfordelingsplan datatekniker V7|fagfordelingsplan datatekniker]]&lt;br /&gt;
*[[fagfordelingsplan IT-Supporter V8|fagfordelingsplan IT-Supporter]]&lt;br /&gt;
*[[fagfordelingsplan kontorservicetekniker V8|fagfordelingsplan kontorservicetekniker]]&lt;br /&gt;
*[[fagfordelingsplan teleinstallationstekniker V8|fagfordelingsplan teleinstallationstekniker]]&lt;br /&gt;
{{FrontpageBox/subject~&lt;br /&gt;
|colorcombination    = 3&lt;br /&gt;
|title = Diverse&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
*[[IT-Supporter version 7 svendeprøve|Uddrag fra bekendtgørelsen om prøver]]&lt;br /&gt;
*[[Datatekniker|Datatekniker Uddrag]] fra [https://www.retsinformation.dk/Forms/R0710.aspx?id=115494 bekendtgørelsen] vedr. &lt;br /&gt;
datatekniker. (Se bilag 2)&lt;br /&gt;
**[[DatateknikerV7/svendeprøve uddrag fra bekendtgørelsen|Svendeprøve uddrag fra bekendtgørelsen]]&lt;br /&gt;
**[[DatateknikerV7/svendeprøve drejebog|Datatekniker version 7 svendeprøve drejebog]]&lt;br /&gt;
***[[DatateknikerV7/svendeprøve drejebog/klade]]&lt;br /&gt;
*[[KontorserviceteknikerV7/svendeprøve svendeprøve uddrag fra bekendtgørelsen|Kontorservicetekniker version 7 uddrag]] fra [https://www.retsinformation.dk/Forms/R0710.aspx?id=115494 bekendtgørelsen]. (Se bilag 2)&lt;br /&gt;
*[[Teleinstallationstekniker version 7 svendeprøve|uddrag]] fra [https://www.retsinformation.dk/Forms/R0710.aspx?id=115494 bekendtgørelsen].&lt;br /&gt;
*Notater om [[Data og kommunikationsuddannelsen]]&lt;br /&gt;
*[[Valgfri Specialefag version 7|Valgfri Specialefag]]&lt;br /&gt;
**http://www.valgfri-specialefag.dk/&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
|valign=top|&lt;br /&gt;
|{{FrontpageBox~&lt;br /&gt;
|colorcombination    = 7&lt;br /&gt;
|picture               = lists.png&lt;br /&gt;
|headline            = Voksenuddannelse&lt;br /&gt;
|bgcolor             = transparent&lt;br /&gt;
|bottombox           = House of Technology&lt;br /&gt;
|content             = &lt;br /&gt;
{{FrontpageBox/subject~&lt;br /&gt;
|colorcombination    = 7&lt;br /&gt;
|title = GVU&lt;br /&gt;
}}&lt;br /&gt;
*[[GVU notater]]&lt;br /&gt;
*[https://www.retsinformation.dk/Forms/R0710.aspx?id=23568 GVU Bekendtgørelse]&lt;br /&gt;
}}&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
[[Category:Portal]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=SSH_Cisco_IOS&amp;diff=41693</id>
		<title>SSH Cisco IOS</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=SSH_Cisco_IOS&amp;diff=41693"/>
				<updated>2025-09-11T05:19:08Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Prerequisits=&lt;br /&gt;
The SSH Version 2 server is supported in Cisco IOS Release 12.3(4)T, 12.3(2)XE, 12.2(25)S, and 12.3(7)JA.&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
The configuration for the SSH Version 2 server is similar to the configuration for SSH Version 1. The '''ip ssh version''' command was introduced so that you may define which version of SSH to configure. If you do not configure this command, SSH by default runs in compatibility mode; that is, both SSH Version 1 and SSH Version 2 connections are honored.&amp;lt;ref&amp;gt;http://www.cisco.com/en/US/docs/ios/sec_user_services/configuration/guide/sec_secure_shell_v2.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
SSH Version 1 is a protocol that has never been defined in a standard. If you do not want your router to fall back to the undefined protocol (Version 1), you should use the ip ssh version command and specify Version 2.&amp;lt;br/&amp;gt;&lt;br /&gt;
On Pre IOS 15 SSH version 2 is only a SSH version 1.99 because it is missing some of the mandatory features of version 2.&lt;br /&gt;
==Restrictions for Secure Shell Version 2 Support==&lt;br /&gt;
*SSH servers and SSH clients are supported in 3DES software images.&lt;br /&gt;
*Execution Shell, remote command execution, and SCP are the only applications supported.&lt;br /&gt;
*Rivest, Shamir, and Adelman (RSA) key generation is an SSH server-side requirement. Routers that act as SSH clients need not generate RSA keys.&lt;br /&gt;
*The RSA key pair size must be greater than or equal to 768.&lt;br /&gt;
*The following functionality is not supported:&lt;br /&gt;
**Port forwarding&lt;br /&gt;
**Compression&lt;br /&gt;
&lt;br /&gt;
=Example of configuration=&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
hostname R1&lt;br /&gt;
!&lt;br /&gt;
ip domain-name TSHOOT.HOT&lt;br /&gt;
crypto key generate rsa general-keys modulus 2048&lt;br /&gt;
!&lt;br /&gt;
username admin password 0 Password1.&lt;br /&gt;
!&lt;br /&gt;
aaa new-model&lt;br /&gt;
aaa authentication login default local&lt;br /&gt;
aaa authentication login CONSOLE none&lt;br /&gt;
aaa authorization exec default local&lt;br /&gt;
aaa session-id common&lt;br /&gt;
!&lt;br /&gt;
enable secret cisco&lt;br /&gt;
!&lt;br /&gt;
ip ssh time-out 60&lt;br /&gt;
ip ssh authentication-retries 2&lt;br /&gt;
ip ssh source-interface Loopback0&lt;br /&gt;
ip ssh logging events&lt;br /&gt;
ip ssh version 2&lt;br /&gt;
!&lt;br /&gt;
line vty 0 4&lt;br /&gt;
 transport input ssh&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
 login authentication CONSOLE&lt;br /&gt;
!&lt;br /&gt;
service password-encryption&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
{{Source cli}}&lt;br /&gt;
[[Category:IOS]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=SSH_Cisco_IOS&amp;diff=41692</id>
		<title>SSH Cisco IOS</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=SSH_Cisco_IOS&amp;diff=41692"/>
				<updated>2025-09-11T05:15:46Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Example of configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Prerequisits=&lt;br /&gt;
The SSH Version 2 server is supported in Cisco IOS Release 12.3(4)T, 12.3(2)XE, 12.2(25)S, and 12.3(7)JA.&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
The configuration for the SSH Version 2 server is similar to the configuration for SSH Version 1. The '''ip ssh version''' command was introduced so that you may define which version of SSH to configure. If you do not configure this command, SSH by default runs in compatibility mode; that is, both SSH Version 1 and SSH Version 2 connections are honored.&amp;lt;ref&amp;gt;http://www.cisco.com/en/US/docs/ios/sec_user_services/configuration/guide/sec_secure_shell_v2.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
SSH Version 1 is a protocol that has never been defined in a standard. If you do not want your router to fall back to the undefined protocol (Version 1), you should use the ip ssh version command and specify Version 2.&amp;lt;br/&amp;gt;&lt;br /&gt;
On Pre IOS 15 SSH version 2 is only a SSH version 1.99 because it is missing some of the mandatory features of version 2.&lt;br /&gt;
==Restrictions for Secure Shell Version 2 Support==&lt;br /&gt;
*SSH servers and SSH clients are supported in 3DES software images.&lt;br /&gt;
*Execution Shell, remote command execution, and SCP are the only applications supported.&lt;br /&gt;
*Rivest, Shamir, and Adelman (RSA) key generation is an SSH server-side requirement. Routers that act as SSH clients need not generate RSA keys.&lt;br /&gt;
*The RSA key pair size must be greater than or equal to 768.&lt;br /&gt;
*The following functionality is not supported:&lt;br /&gt;
**Port forwarding&lt;br /&gt;
**Compression&lt;br /&gt;
&lt;br /&gt;
=Example of configuration=&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
hostname R1&lt;br /&gt;
!&lt;br /&gt;
ip domain-name TSHOOT.HOT&lt;br /&gt;
crypto key generate rsa general-keys modulus 1024&lt;br /&gt;
!&lt;br /&gt;
username admin password 0 Password1.&lt;br /&gt;
!&lt;br /&gt;
aaa new-model&lt;br /&gt;
aaa authentication login default local&lt;br /&gt;
aaa authentication login CONSOLE none&lt;br /&gt;
aaa authorization exec default local&lt;br /&gt;
aaa session-id common&lt;br /&gt;
!&lt;br /&gt;
enable secret cisco&lt;br /&gt;
!&lt;br /&gt;
ip ssh time-out 60&lt;br /&gt;
ip ssh authentication-retries 2&lt;br /&gt;
ip ssh source-interface Loopback0&lt;br /&gt;
ip ssh logging events&lt;br /&gt;
ip ssh version 2&lt;br /&gt;
!&lt;br /&gt;
line vty 0 4&lt;br /&gt;
 transport input ssh&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
 login authentication CONSOLE&lt;br /&gt;
!&lt;br /&gt;
service password-encryption&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
{{Source cli}}&lt;br /&gt;
[[Category:IOS]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=SSH_Cisco_IOS&amp;diff=41691</id>
		<title>SSH Cisco IOS</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=SSH_Cisco_IOS&amp;diff=41691"/>
				<updated>2025-09-11T05:13:19Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Prerequisits=&lt;br /&gt;
The SSH Version 2 server is supported in Cisco IOS Release 12.3(4)T, 12.3(2)XE, 12.2(25)S, and 12.3(7)JA.&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
The configuration for the SSH Version 2 server is similar to the configuration for SSH Version 1. The '''ip ssh version''' command was introduced so that you may define which version of SSH to configure. If you do not configure this command, SSH by default runs in compatibility mode; that is, both SSH Version 1 and SSH Version 2 connections are honored.&amp;lt;ref&amp;gt;http://www.cisco.com/en/US/docs/ios/sec_user_services/configuration/guide/sec_secure_shell_v2.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
SSH Version 1 is a protocol that has never been defined in a standard. If you do not want your router to fall back to the undefined protocol (Version 1), you should use the ip ssh version command and specify Version 2.&amp;lt;br/&amp;gt;&lt;br /&gt;
On Pre IOS 15 SSH version 2 is only a SSH version 1.99 because it is missing some of the mandatory features of version 2.&lt;br /&gt;
==Restrictions for Secure Shell Version 2 Support==&lt;br /&gt;
*SSH servers and SSH clients are supported in 3DES software images.&lt;br /&gt;
*Execution Shell, remote command execution, and SCP are the only applications supported.&lt;br /&gt;
*Rivest, Shamir, and Adelman (RSA) key generation is an SSH server-side requirement. Routers that act as SSH clients need not generate RSA keys.&lt;br /&gt;
*The RSA key pair size must be greater than or equal to 768.&lt;br /&gt;
*The following functionality is not supported:&lt;br /&gt;
**Port forwarding&lt;br /&gt;
**Compression&lt;br /&gt;
&lt;br /&gt;
=Example of configuration=&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
hostname R1&lt;br /&gt;
!&lt;br /&gt;
ip domain-name TSHOOT.HOT&lt;br /&gt;
crypto key generate rsa general-keys modulus 1024&lt;br /&gt;
!&lt;br /&gt;
username admin password 0 l8heise&lt;br /&gt;
!&lt;br /&gt;
aaa new-model&lt;br /&gt;
aaa authentication login default local&lt;br /&gt;
aaa authentication login CONSOLE none&lt;br /&gt;
aaa authorization exec default local&lt;br /&gt;
aaa session-id common&lt;br /&gt;
!&lt;br /&gt;
enable secret cisco&lt;br /&gt;
!&lt;br /&gt;
ip ssh time-out 60&lt;br /&gt;
ip ssh authentication-retries 2&lt;br /&gt;
ip ssh source-interface Loopback0&lt;br /&gt;
ip ssh logging events&lt;br /&gt;
ip ssh version 2&lt;br /&gt;
!&lt;br /&gt;
line vty 0 4&lt;br /&gt;
 transport input ssh&lt;br /&gt;
!&lt;br /&gt;
line con 0&lt;br /&gt;
 login authentication CONSOLE&lt;br /&gt;
!&lt;br /&gt;
service password-encryption&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
{{Source cli}}&lt;br /&gt;
[[Category:IOS]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Screen_linux_command&amp;diff=41690</id>
		<title>Screen linux command</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Screen_linux_command&amp;diff=41690"/>
				<updated>2025-09-09T05:38:23Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Annoying flashing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Split screen=&lt;br /&gt;
Two consoles working together&lt;br /&gt;
==On console 1==&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
screen -S banan&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
==On console 2==&lt;br /&gt;
Same user as on console 1&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
screen -x banan&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
==Annoying flashing==&lt;br /&gt;
You can do what you want in a terminal-independent way using just your ''.screenrc''&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
vbell on&lt;br /&gt;
vbell_msg ''&lt;br /&gt;
termcapinfo *  vb=:&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
The settings are:&lt;br /&gt;
&lt;br /&gt;
#first line (you already did this)&lt;br /&gt;
#second line cancels the Wuff, Wuff!&lt;br /&gt;
#third line sets the flash to an empty string&lt;br /&gt;
&lt;br /&gt;
Note that the trailing colon (:) is needed for the termcap syntax used by screen.&lt;br /&gt;
&lt;br /&gt;
{{Source cli}}&lt;br /&gt;
[[category:Linux]][[category:Linux Command]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41689</id>
		<title>AMU HAMMR</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41689"/>
				<updated>2025-09-04T12:36:26Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Materialer anvendt=&lt;br /&gt;
== Uge 1==&lt;br /&gt;
[[Image:Agenda ascom.png|thumb|500px|none|Agenda]]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/01.01%20-%20Introduction%20to%20IP%20Generic%20diasshow.ppsx Network 1]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/02.01%20-%20Module%201%20Session%202%20diasshow.ppsx Network 2]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/03.01%20-%20Module%201%20Session%203%20diasshow.ppsx Network 3]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/04.01%20-%20Module%201%20Session%204%20diasshow.ppsx Network 4]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/05.01%20-%20Module%201%20Session%205%20diasshow.ppsx Network 5]&lt;br /&gt;
&lt;br /&gt;
==Subnetting==&lt;br /&gt;
[[File:23.1_-_SUBNET_eksempel.pdf| Subnet eksempel]]&lt;br /&gt;
==VPN introduktion==&lt;br /&gt;
[https://mars.merhot.dk/data/pdf/VPN_intro.pdf VPN Introduktion]&lt;br /&gt;
&lt;br /&gt;
== Router øvelse med nat==&lt;br /&gt;
=== Del 1 uden Trunking ===&lt;br /&gt;
Overordnet plan vi lagde:&lt;br /&gt;
Router grundkonfig:&lt;br /&gt;
#fa0/0 - DHCP (Anvend ISP'ens DHCP-server)&lt;br /&gt;
#Test: show ip int brief, ping 8.8.8.8&lt;br /&gt;
#fa0/1 - Statisk IP 172.16.0.1/24&lt;br /&gt;
#Test: show ip int br, ping 172.16.0.1&lt;br /&gt;
#Konfigurer NAT&lt;br /&gt;
#Test: ping 8.8.8.8 source 172.16.0.1&lt;br /&gt;
#Test: show ip nat translations&lt;br /&gt;
#Konfigurer DHCP på 172.16.0.0/24 scope&lt;br /&gt;
#Tilslut PC og test den får en ip&lt;br /&gt;
&lt;br /&gt;
Del 2:&lt;br /&gt;
- VLAN til Teacher og Student&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=== Del 1 med Trunking ===&lt;br /&gt;
====Router====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool TEACHER&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.1.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 no ip address&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.10&lt;br /&gt;
 encapsulation dot1Q 10&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.20&lt;br /&gt;
 encapsulation dot1Q 20&lt;br /&gt;
 ip address 172.16.1.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Lag 2 switch====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname Switch&lt;br /&gt;
&lt;br /&gt;
interface FastEthernet0/1&lt;br /&gt;
 switchport mode trunk&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/5 - 10&lt;br /&gt;
 switchport access vlan 10&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/11 - 19&lt;br /&gt;
 switchport access vlan 20&lt;br /&gt;
 switchport mode access&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Del 2 - med LAG 3 switch - statisk routening==&lt;br /&gt;
===SOHO Router===&lt;br /&gt;
Følgende ekstra konfiguration af SOHO Routeren er foretaget - udover det i del 1.&lt;br /&gt;
&lt;br /&gt;
*Netværk opbygget i Packet Tracer: [https://mars.merhot.dk/data/netAMU2025.pkt NetAMU2025.pkt]&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
!&lt;br /&gt;
ip dhcp excluded-address 10.0.1.1 10.0.1.9&lt;br /&gt;
ip dhcp excluded-address 10.0.0.1 10.0.0.9&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool GUEST&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.0.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool HACKERS&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.1.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.1.1&lt;br /&gt;
!&lt;br /&gt;
ip route 10.0.0.0 255.255.255.0 172.16.0.10&lt;br /&gt;
ip route 10.0.1.0 255.255.255.0 172.16.0.10&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255 &lt;br /&gt;
access-list 1 permit 10.0.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 10.0.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Lag tre switch===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ip routing&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/1 - 4&lt;br /&gt;
 switchport mode access&lt;br /&gt;
 switchport access vlan 30&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 40&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/10&lt;br /&gt;
 no switchport&lt;br /&gt;
 ip address 172.16.0.10 255.255.255.0&lt;br /&gt;
!&lt;br /&gt;
interface Vlan30&lt;br /&gt;
 ip address 10.0.0.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
interface Vlan40&lt;br /&gt;
 ip address 10.0.1.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip route 0.0.0.0 0.0.0.0 172.16.0.1&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://www.netacad.com/ Link til Cisco Netacad]&lt;br /&gt;
*[[ASC II]] - Koder for bogstaver og tal &lt;br /&gt;
*[https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Putty]  et gratis terminal emuleringssoftware&lt;br /&gt;
[[Category:Course]][[Category:Network]]&lt;br /&gt;
*[https://www.netacad.com/courses/ccna-introduction-networks?courseLang=en-US&amp;amp;instance_id=46a950b1-8175-474a-85fe-0e5e906a7f1a Introduction to networks]&lt;br /&gt;
*[https://www.youtube.com/watch?v=FIV2-44uTmw Fiber kabel lægning med skibet Resolute]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41688</id>
		<title>AMU HAMMR</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41688"/>
				<updated>2025-09-04T12:35:33Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Subnetting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Materialer anvendt=&lt;br /&gt;
== Uge 1==&lt;br /&gt;
[[Image:Agenda ascom.png|thumb|500px|none|Agenda]]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/01.01%20-%20Introduction%20to%20IP%20Generic%20diasshow.ppsx Network 1]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/02.01%20-%20Module%201%20Session%202%20diasshow.ppsx Network 2]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/03.01%20-%20Module%201%20Session%203%20diasshow.ppsx Network 3]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/04.01%20-%20Module%201%20Session%204%20diasshow.ppsx Network 4]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/05.01%20-%20Module%201%20Session%205%20diasshow.ppsx Network 5]&lt;br /&gt;
&lt;br /&gt;
==Subnetting==&lt;br /&gt;
[[File:23.1_-_SUBNET_eksempel.pdf| Subnet eksempel]]&lt;br /&gt;
==VPN introduktion==&lt;br /&gt;
[[File:https://mars.merhot.dk/data/pdf/VPN_intro.pdf VPN Introduktion]]&lt;br /&gt;
&lt;br /&gt;
== Router øvelse med nat==&lt;br /&gt;
=== Del 1 uden Trunking ===&lt;br /&gt;
Overordnet plan vi lagde:&lt;br /&gt;
Router grundkonfig:&lt;br /&gt;
#fa0/0 - DHCP (Anvend ISP'ens DHCP-server)&lt;br /&gt;
#Test: show ip int brief, ping 8.8.8.8&lt;br /&gt;
#fa0/1 - Statisk IP 172.16.0.1/24&lt;br /&gt;
#Test: show ip int br, ping 172.16.0.1&lt;br /&gt;
#Konfigurer NAT&lt;br /&gt;
#Test: ping 8.8.8.8 source 172.16.0.1&lt;br /&gt;
#Test: show ip nat translations&lt;br /&gt;
#Konfigurer DHCP på 172.16.0.0/24 scope&lt;br /&gt;
#Tilslut PC og test den får en ip&lt;br /&gt;
&lt;br /&gt;
Del 2:&lt;br /&gt;
- VLAN til Teacher og Student&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=== Del 1 med Trunking ===&lt;br /&gt;
====Router====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool TEACHER&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.1.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 no ip address&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.10&lt;br /&gt;
 encapsulation dot1Q 10&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.20&lt;br /&gt;
 encapsulation dot1Q 20&lt;br /&gt;
 ip address 172.16.1.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Lag 2 switch====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname Switch&lt;br /&gt;
&lt;br /&gt;
interface FastEthernet0/1&lt;br /&gt;
 switchport mode trunk&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/5 - 10&lt;br /&gt;
 switchport access vlan 10&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/11 - 19&lt;br /&gt;
 switchport access vlan 20&lt;br /&gt;
 switchport mode access&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Del 2 - med LAG 3 switch - statisk routening==&lt;br /&gt;
===SOHO Router===&lt;br /&gt;
Følgende ekstra konfiguration af SOHO Routeren er foretaget - udover det i del 1.&lt;br /&gt;
&lt;br /&gt;
*Netværk opbygget i Packet Tracer: [https://mars.merhot.dk/data/netAMU2025.pkt NetAMU2025.pkt]&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
!&lt;br /&gt;
ip dhcp excluded-address 10.0.1.1 10.0.1.9&lt;br /&gt;
ip dhcp excluded-address 10.0.0.1 10.0.0.9&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool GUEST&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.0.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool HACKERS&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.1.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.1.1&lt;br /&gt;
!&lt;br /&gt;
ip route 10.0.0.0 255.255.255.0 172.16.0.10&lt;br /&gt;
ip route 10.0.1.0 255.255.255.0 172.16.0.10&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255 &lt;br /&gt;
access-list 1 permit 10.0.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 10.0.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Lag tre switch===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ip routing&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/1 - 4&lt;br /&gt;
 switchport mode access&lt;br /&gt;
 switchport access vlan 30&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 40&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/10&lt;br /&gt;
 no switchport&lt;br /&gt;
 ip address 172.16.0.10 255.255.255.0&lt;br /&gt;
!&lt;br /&gt;
interface Vlan30&lt;br /&gt;
 ip address 10.0.0.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
interface Vlan40&lt;br /&gt;
 ip address 10.0.1.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip route 0.0.0.0 0.0.0.0 172.16.0.1&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://www.netacad.com/ Link til Cisco Netacad]&lt;br /&gt;
*[[ASC II]] - Koder for bogstaver og tal &lt;br /&gt;
*[https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Putty]  et gratis terminal emuleringssoftware&lt;br /&gt;
[[Category:Course]][[Category:Network]]&lt;br /&gt;
*[https://www.netacad.com/courses/ccna-introduction-networks?courseLang=en-US&amp;amp;instance_id=46a950b1-8175-474a-85fe-0e5e906a7f1a Introduction to networks]&lt;br /&gt;
*[https://www.youtube.com/watch?v=FIV2-44uTmw Fiber kabel lægning med skibet Resolute]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Switch_port_mirroring&amp;diff=41687</id>
		<title>Switch port mirroring</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Switch_port_mirroring&amp;diff=41687"/>
				<updated>2025-09-03T07:46:42Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Mirror a trunk port or other layer 2 traffic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Switch port mirroring is often used when sniffing traffic to/from a device. Se drawing below.&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
[[Image:Switch with mirror function.png|thumb|700px|left| Switch with port mirroring]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*[http://wiki.wireshark.org/SwitchReference Wireshark Switch reference list]&lt;br /&gt;
=Cisco Switch=&lt;br /&gt;
Example below: Send a copy of traffic on fastethernet 0/1 to fastethernet 0/2. Traffic in both directions are mirrored.&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
SW1# configure terminal&lt;br /&gt;
SW1(config)# monitor session 1 source interface fastethernet0/1 &lt;br /&gt;
SW1(config)# monitor session 1 destination interface fastethernet 0/2&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Remove mirror from session 1.&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
SW1# CONFIGURE TERMINAL&lt;br /&gt;
SW1(config)# no MONITOR SESSION 1 &lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
== Mirror a trunk port or other layer 2 traffic==&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
SW1# configure terminal&lt;br /&gt;
SW1(config)# monitor session 1 source interface fastethernet0/1 &lt;br /&gt;
SW1(config)# monitor session 1 destination interface fastethernet 0/2  encapsulation replicate&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Zyxel switch=&lt;br /&gt;
Copy traffic from port 1,4,5 and 6 to port 3 (Note '''both''' means mirror traffic in both directions)&lt;br /&gt;
*&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
Switch(config)# &amp;lt;input&amp;gt;mirror-port&amp;lt;/input&amp;gt;&lt;br /&gt;
Switch(config)# &amp;lt;input&amp;gt;mirror-port 3&amp;lt;/input&amp;gt;&lt;br /&gt;
Switch(config)# &amp;lt;input&amp;gt;interface port-channel 1,4-6&amp;lt;/input&amp;gt;&lt;br /&gt;
Switch(config-interface)# &amp;lt;input&amp;gt;mirror&amp;lt;/input&amp;gt;&lt;br /&gt;
Switch(config-interface)# &amp;lt;input&amp;gt;mirror dir both&amp;lt;/input&amp;gt;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Remove mirror again&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
Switch(config)# &amp;lt;input&amp;gt;no mirror-port&amp;lt;/input&amp;gt;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=LG iPECS ES-3026P=&lt;br /&gt;
==From CLI==&lt;br /&gt;
Monitor traffic in both directions on port 1/7 mirrorport 1/17&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
iPECS Ethernet Switch Administration&lt;br /&gt;
&lt;br /&gt;
Username: &amp;lt;input&amp;gt;admin&amp;lt;/input&amp;gt;&lt;br /&gt;
Password: &amp;lt;input&amp;gt;admin&amp;lt;/input&amp;gt;&lt;br /&gt;
&lt;br /&gt;
      CLI session with the ES-3026P is opened.&lt;br /&gt;
      To end the CLI session, enter [Exit].&lt;br /&gt;
&lt;br /&gt;
ES-3026P#&amp;lt;input&amp;gt;configure&amp;lt;/input&amp;gt;&lt;br /&gt;
ES-3026P(config)#&amp;lt;input&amp;gt;interface ethernet 1/17&amp;lt;/input&amp;gt;&lt;br /&gt;
ES-3026P(config-if)#&amp;lt;input&amp;gt;port monitor ethernet 1/7 both&amp;lt;/input&amp;gt;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Remove mirror port again&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
ES-3026P#&amp;lt;input&amp;gt;configure&amp;lt;/input&amp;gt;&lt;br /&gt;
ES-3026P(config)#&amp;lt;input&amp;gt;interface ethernet 1/17&amp;lt;/input&amp;gt;&lt;br /&gt;
ES-3026P(config-if)#&amp;lt;input&amp;gt;no port monitor ethernet 1/7&amp;lt;/input&amp;gt;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
==From GUI==&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
[[Image:LGs1.gif|700px|thumb|left|Add mirror from webinterface on switch]]&lt;br /&gt;
|-&lt;br /&gt;
[[Image:LGs2.gif|700px|thumb|left|Remove mirror from webinterface on switch]]&lt;br /&gt;
|}&lt;br /&gt;
=Network taps=&lt;br /&gt;
==Dual Comm==&lt;br /&gt;
*[http://www.lovemytool.com/blog/2010/04/review-of-dualcomm-5-port-pass-through-port-mirroring-switch-by-betty-dubois.html Artikel om Dualcomm 5-Port Pass-Through Port Mirroring Switch]&lt;br /&gt;
*[http://www.dual-comm.com/gigabit_port-mirroring-LAN_switch.htm 10/100/1000 Network TAP] med PoS pass-through. Powerered fra USB&lt;br /&gt;
*[http://www.dual-comm.com/ Dual-Comm hjemmeside]&lt;br /&gt;
&lt;br /&gt;
{{Source cli}}&lt;br /&gt;
[[Category:Network]][[Category:Fejlfinding]][[Category:Network management]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=Switch_port_mirroring&amp;diff=41686</id>
		<title>Switch port mirroring</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=Switch_port_mirroring&amp;diff=41686"/>
				<updated>2025-09-03T07:46:31Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Switch port mirroring is often used when sniffing traffic to/from a device. Se drawing below.&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
[[Image:Switch with mirror function.png|thumb|700px|left| Switch with port mirroring]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*[http://wiki.wireshark.org/SwitchReference Wireshark Switch reference list]&lt;br /&gt;
=Cisco Switch=&lt;br /&gt;
Example below: Send a copy of traffic on fastethernet 0/1 to fastethernet 0/2. Traffic in both directions are mirrored.&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
SW1# configure terminal&lt;br /&gt;
SW1(config)# monitor session 1 source interface fastethernet0/1 &lt;br /&gt;
SW1(config)# monitor session 1 destination interface fastethernet 0/2&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Remove mirror from session 1.&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
SW1# CONFIGURE TERMINAL&lt;br /&gt;
SW1(config)# no MONITOR SESSION 1 &lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
== Mirror a trunk port or other layer 2 traffic==&lt;br /&gt;
&amp;lt;/source lang=cli&amp;gt;&lt;br /&gt;
SW1# configure terminal&lt;br /&gt;
SW1(config)# monitor session 1 source interface fastethernet0/1 &lt;br /&gt;
SW1(config)# monitor session 1 destination interface fastethernet 0/2  encapsulation replicate&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=Zyxel switch=&lt;br /&gt;
Copy traffic from port 1,4,5 and 6 to port 3 (Note '''both''' means mirror traffic in both directions)&lt;br /&gt;
*&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
Switch(config)# &amp;lt;input&amp;gt;mirror-port&amp;lt;/input&amp;gt;&lt;br /&gt;
Switch(config)# &amp;lt;input&amp;gt;mirror-port 3&amp;lt;/input&amp;gt;&lt;br /&gt;
Switch(config)# &amp;lt;input&amp;gt;interface port-channel 1,4-6&amp;lt;/input&amp;gt;&lt;br /&gt;
Switch(config-interface)# &amp;lt;input&amp;gt;mirror&amp;lt;/input&amp;gt;&lt;br /&gt;
Switch(config-interface)# &amp;lt;input&amp;gt;mirror dir both&amp;lt;/input&amp;gt;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Remove mirror again&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
Switch(config)# &amp;lt;input&amp;gt;no mirror-port&amp;lt;/input&amp;gt;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=LG iPECS ES-3026P=&lt;br /&gt;
==From CLI==&lt;br /&gt;
Monitor traffic in both directions on port 1/7 mirrorport 1/17&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
iPECS Ethernet Switch Administration&lt;br /&gt;
&lt;br /&gt;
Username: &amp;lt;input&amp;gt;admin&amp;lt;/input&amp;gt;&lt;br /&gt;
Password: &amp;lt;input&amp;gt;admin&amp;lt;/input&amp;gt;&lt;br /&gt;
&lt;br /&gt;
      CLI session with the ES-3026P is opened.&lt;br /&gt;
      To end the CLI session, enter [Exit].&lt;br /&gt;
&lt;br /&gt;
ES-3026P#&amp;lt;input&amp;gt;configure&amp;lt;/input&amp;gt;&lt;br /&gt;
ES-3026P(config)#&amp;lt;input&amp;gt;interface ethernet 1/17&amp;lt;/input&amp;gt;&lt;br /&gt;
ES-3026P(config-if)#&amp;lt;input&amp;gt;port monitor ethernet 1/7 both&amp;lt;/input&amp;gt;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Remove mirror port again&lt;br /&gt;
&amp;lt;source lang=cli&amp;gt;&lt;br /&gt;
ES-3026P#&amp;lt;input&amp;gt;configure&amp;lt;/input&amp;gt;&lt;br /&gt;
ES-3026P(config)#&amp;lt;input&amp;gt;interface ethernet 1/17&amp;lt;/input&amp;gt;&lt;br /&gt;
ES-3026P(config-if)#&amp;lt;input&amp;gt;no port monitor ethernet 1/7&amp;lt;/input&amp;gt;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
==From GUI==&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
[[Image:LGs1.gif|700px|thumb|left|Add mirror from webinterface on switch]]&lt;br /&gt;
|-&lt;br /&gt;
[[Image:LGs2.gif|700px|thumb|left|Remove mirror from webinterface on switch]]&lt;br /&gt;
|}&lt;br /&gt;
=Network taps=&lt;br /&gt;
==Dual Comm==&lt;br /&gt;
*[http://www.lovemytool.com/blog/2010/04/review-of-dualcomm-5-port-pass-through-port-mirroring-switch-by-betty-dubois.html Artikel om Dualcomm 5-Port Pass-Through Port Mirroring Switch]&lt;br /&gt;
*[http://www.dual-comm.com/gigabit_port-mirroring-LAN_switch.htm 10/100/1000 Network TAP] med PoS pass-through. Powerered fra USB&lt;br /&gt;
*[http://www.dual-comm.com/ Dual-Comm hjemmeside]&lt;br /&gt;
&lt;br /&gt;
{{Source cli}}&lt;br /&gt;
[[Category:Network]][[Category:Fejlfinding]][[Category:Network management]]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41685</id>
		<title>AMU HAMMR</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41685"/>
				<updated>2025-09-02T11:56:35Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* SOHO Router */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Materialer anvendt=&lt;br /&gt;
== Uge 1==&lt;br /&gt;
[[Image:Agenda ascom.png|thumb|500px|none|Agenda]]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/01.01%20-%20Introduction%20to%20IP%20Generic%20diasshow.ppsx Network 1]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/02.01%20-%20Module%201%20Session%202%20diasshow.ppsx Network 2]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/03.01%20-%20Module%201%20Session%203%20diasshow.ppsx Network 3]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/04.01%20-%20Module%201%20Session%204%20diasshow.ppsx Network 4]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/05.01%20-%20Module%201%20Session%205%20diasshow.ppsx Network 5]&lt;br /&gt;
&lt;br /&gt;
==Subnetting==&lt;br /&gt;
[[File:23.1_-_SUBNET_eksempel.pdf| Subnet eksempel]]&lt;br /&gt;
== Router øvelse med nat==&lt;br /&gt;
=== Del 1 uden Trunking ===&lt;br /&gt;
Overordnet plan vi lagde:&lt;br /&gt;
Router grundkonfig:&lt;br /&gt;
#fa0/0 - DHCP (Anvend ISP'ens DHCP-server)&lt;br /&gt;
#Test: show ip int brief, ping 8.8.8.8&lt;br /&gt;
#fa0/1 - Statisk IP 172.16.0.1/24&lt;br /&gt;
#Test: show ip int br, ping 172.16.0.1&lt;br /&gt;
#Konfigurer NAT&lt;br /&gt;
#Test: ping 8.8.8.8 source 172.16.0.1&lt;br /&gt;
#Test: show ip nat translations&lt;br /&gt;
#Konfigurer DHCP på 172.16.0.0/24 scope&lt;br /&gt;
#Tilslut PC og test den får en ip&lt;br /&gt;
&lt;br /&gt;
Del 2:&lt;br /&gt;
- VLAN til Teacher og Student&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=== Del 1 med Trunking ===&lt;br /&gt;
====Router====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool TEACHER&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.1.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 no ip address&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.10&lt;br /&gt;
 encapsulation dot1Q 10&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.20&lt;br /&gt;
 encapsulation dot1Q 20&lt;br /&gt;
 ip address 172.16.1.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Lag 2 switch====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname Switch&lt;br /&gt;
&lt;br /&gt;
interface FastEthernet0/1&lt;br /&gt;
 switchport mode trunk&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/5 - 10&lt;br /&gt;
 switchport access vlan 10&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/11 - 19&lt;br /&gt;
 switchport access vlan 20&lt;br /&gt;
 switchport mode access&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Del 2 - med LAG 3 switch - statisk routening==&lt;br /&gt;
===SOHO Router===&lt;br /&gt;
Følgende ekstra konfiguration af SOHO Routeren er foretaget - udover det i del 1.&lt;br /&gt;
&lt;br /&gt;
*Netværk opbygget i Packet Tracer: [https://mars.merhot.dk/data/netAMU2025.pkt NetAMU2025.pkt]&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
!&lt;br /&gt;
ip dhcp excluded-address 10.0.1.1 10.0.1.9&lt;br /&gt;
ip dhcp excluded-address 10.0.0.1 10.0.0.9&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool GUEST&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.0.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool HACKERS&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.1.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.1.1&lt;br /&gt;
!&lt;br /&gt;
ip route 10.0.0.0 255.255.255.0 172.16.0.10&lt;br /&gt;
ip route 10.0.1.0 255.255.255.0 172.16.0.10&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255 &lt;br /&gt;
access-list 1 permit 10.0.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 10.0.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Lag tre switch===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ip routing&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/1 - 4&lt;br /&gt;
 switchport mode access&lt;br /&gt;
 switchport access vlan 30&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 40&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/10&lt;br /&gt;
 no switchport&lt;br /&gt;
 ip address 172.16.0.10 255.255.255.0&lt;br /&gt;
!&lt;br /&gt;
interface Vlan30&lt;br /&gt;
 ip address 10.0.0.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
interface Vlan40&lt;br /&gt;
 ip address 10.0.1.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip route 0.0.0.0 0.0.0.0 172.16.0.1&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://www.netacad.com/ Link til Cisco Netacad]&lt;br /&gt;
*[[ASC II]] - Koder for bogstaver og tal &lt;br /&gt;
*[https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Putty]  et gratis terminal emuleringssoftware&lt;br /&gt;
[[Category:Course]][[Category:Network]]&lt;br /&gt;
*[https://www.netacad.com/courses/ccna-introduction-networks?courseLang=en-US&amp;amp;instance_id=46a950b1-8175-474a-85fe-0e5e906a7f1a Introduction to networks]&lt;br /&gt;
*[https://www.youtube.com/watch?v=FIV2-44uTmw Fiber kabel lægning med skibet Resolute]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41684</id>
		<title>AMU HAMMR</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41684"/>
				<updated>2025-09-02T11:45:21Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Lag tre switch */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Materialer anvendt=&lt;br /&gt;
== Uge 1==&lt;br /&gt;
[[Image:Agenda ascom.png|thumb|500px|none|Agenda]]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/01.01%20-%20Introduction%20to%20IP%20Generic%20diasshow.ppsx Network 1]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/02.01%20-%20Module%201%20Session%202%20diasshow.ppsx Network 2]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/03.01%20-%20Module%201%20Session%203%20diasshow.ppsx Network 3]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/04.01%20-%20Module%201%20Session%204%20diasshow.ppsx Network 4]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/05.01%20-%20Module%201%20Session%205%20diasshow.ppsx Network 5]&lt;br /&gt;
&lt;br /&gt;
==Subnetting==&lt;br /&gt;
[[File:23.1_-_SUBNET_eksempel.pdf| Subnet eksempel]]&lt;br /&gt;
== Router øvelse med nat==&lt;br /&gt;
=== Del 1 uden Trunking ===&lt;br /&gt;
Overordnet plan vi lagde:&lt;br /&gt;
Router grundkonfig:&lt;br /&gt;
#fa0/0 - DHCP (Anvend ISP'ens DHCP-server)&lt;br /&gt;
#Test: show ip int brief, ping 8.8.8.8&lt;br /&gt;
#fa0/1 - Statisk IP 172.16.0.1/24&lt;br /&gt;
#Test: show ip int br, ping 172.16.0.1&lt;br /&gt;
#Konfigurer NAT&lt;br /&gt;
#Test: ping 8.8.8.8 source 172.16.0.1&lt;br /&gt;
#Test: show ip nat translations&lt;br /&gt;
#Konfigurer DHCP på 172.16.0.0/24 scope&lt;br /&gt;
#Tilslut PC og test den får en ip&lt;br /&gt;
&lt;br /&gt;
Del 2:&lt;br /&gt;
- VLAN til Teacher og Student&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=== Del 1 med Trunking ===&lt;br /&gt;
====Router====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool TEACHER&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.1.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 no ip address&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.10&lt;br /&gt;
 encapsulation dot1Q 10&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.20&lt;br /&gt;
 encapsulation dot1Q 20&lt;br /&gt;
 ip address 172.16.1.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Lag 2 switch====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname Switch&lt;br /&gt;
&lt;br /&gt;
interface FastEthernet0/1&lt;br /&gt;
 switchport mode trunk&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/5 - 10&lt;br /&gt;
 switchport access vlan 10&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/11 - 19&lt;br /&gt;
 switchport access vlan 20&lt;br /&gt;
 switchport mode access&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Del 2 - med LAG 3 switch - statisk routening==&lt;br /&gt;
===SOHO Router===&lt;br /&gt;
Følgende ekstra konfiguration af SOHO Routeren er foretaget - udover det i del 1.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
!&lt;br /&gt;
ip dhcp excluded-address 10.0.1.1 10.0.1.9&lt;br /&gt;
ip dhcp excluded-address 10.0.0.1 10.0.0.9&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool GUEST&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.0.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool HACKERS&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.1.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.1.1&lt;br /&gt;
!&lt;br /&gt;
ip route 10.0.0.0 255.255.255.0 172.16.0.10&lt;br /&gt;
ip route 10.0.1.0 255.255.255.0 172.16.0.10&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255 &lt;br /&gt;
access-list 1 permit 10.0.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 10.0.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Lag tre switch===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ip routing&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/1 - 4&lt;br /&gt;
 switchport mode access&lt;br /&gt;
 switchport access vlan 30&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 40&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/10&lt;br /&gt;
 no switchport&lt;br /&gt;
 ip address 172.16.0.10 255.255.255.0&lt;br /&gt;
!&lt;br /&gt;
interface Vlan30&lt;br /&gt;
 ip address 10.0.0.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
interface Vlan40&lt;br /&gt;
 ip address 10.0.1.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip route 0.0.0.0 0.0.0.0 172.16.0.1&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://www.netacad.com/ Link til Cisco Netacad]&lt;br /&gt;
*[[ASC II]] - Koder for bogstaver og tal &lt;br /&gt;
*[https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Putty]  et gratis terminal emuleringssoftware&lt;br /&gt;
[[Category:Course]][[Category:Network]]&lt;br /&gt;
*[https://www.netacad.com/courses/ccna-introduction-networks?courseLang=en-US&amp;amp;instance_id=46a950b1-8175-474a-85fe-0e5e906a7f1a Introduction to networks]&lt;br /&gt;
*[https://www.youtube.com/watch?v=FIV2-44uTmw Fiber kabel lægning med skibet Resolute]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41683</id>
		<title>AMU HAMMR</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41683"/>
				<updated>2025-09-02T11:37:42Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* SOHO Router */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Materialer anvendt=&lt;br /&gt;
== Uge 1==&lt;br /&gt;
[[Image:Agenda ascom.png|thumb|500px|none|Agenda]]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/01.01%20-%20Introduction%20to%20IP%20Generic%20diasshow.ppsx Network 1]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/02.01%20-%20Module%201%20Session%202%20diasshow.ppsx Network 2]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/03.01%20-%20Module%201%20Session%203%20diasshow.ppsx Network 3]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/04.01%20-%20Module%201%20Session%204%20diasshow.ppsx Network 4]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/05.01%20-%20Module%201%20Session%205%20diasshow.ppsx Network 5]&lt;br /&gt;
&lt;br /&gt;
==Subnetting==&lt;br /&gt;
[[File:23.1_-_SUBNET_eksempel.pdf| Subnet eksempel]]&lt;br /&gt;
== Router øvelse med nat==&lt;br /&gt;
=== Del 1 uden Trunking ===&lt;br /&gt;
Overordnet plan vi lagde:&lt;br /&gt;
Router grundkonfig:&lt;br /&gt;
#fa0/0 - DHCP (Anvend ISP'ens DHCP-server)&lt;br /&gt;
#Test: show ip int brief, ping 8.8.8.8&lt;br /&gt;
#fa0/1 - Statisk IP 172.16.0.1/24&lt;br /&gt;
#Test: show ip int br, ping 172.16.0.1&lt;br /&gt;
#Konfigurer NAT&lt;br /&gt;
#Test: ping 8.8.8.8 source 172.16.0.1&lt;br /&gt;
#Test: show ip nat translations&lt;br /&gt;
#Konfigurer DHCP på 172.16.0.0/24 scope&lt;br /&gt;
#Tilslut PC og test den får en ip&lt;br /&gt;
&lt;br /&gt;
Del 2:&lt;br /&gt;
- VLAN til Teacher og Student&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=== Del 1 med Trunking ===&lt;br /&gt;
====Router====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool TEACHER&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.1.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 no ip address&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.10&lt;br /&gt;
 encapsulation dot1Q 10&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.20&lt;br /&gt;
 encapsulation dot1Q 20&lt;br /&gt;
 ip address 172.16.1.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Lag 2 switch====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname Switch&lt;br /&gt;
&lt;br /&gt;
interface FastEthernet0/1&lt;br /&gt;
 switchport mode trunk&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/5 - 10&lt;br /&gt;
 switchport access vlan 10&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/11 - 19&lt;br /&gt;
 switchport access vlan 20&lt;br /&gt;
 switchport mode access&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Del 2 - med LAG 3 switch - statisk routening==&lt;br /&gt;
===SOHO Router===&lt;br /&gt;
Følgende ekstra konfiguration af SOHO Routeren er foretaget - udover det i del 1.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
!&lt;br /&gt;
ip dhcp excluded-address 10.0.1.1 10.0.1.9&lt;br /&gt;
ip dhcp excluded-address 10.0.0.1 10.0.0.9&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool GUEST&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.0.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool HACKERS&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.1.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.1.1&lt;br /&gt;
!&lt;br /&gt;
ip route 10.0.0.0 255.255.255.0 172.16.0.10&lt;br /&gt;
ip route 10.0.1.0 255.255.255.0 172.16.0.10&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255 &lt;br /&gt;
access-list 1 permit 10.0.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 10.0.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Lag tre switch===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ip routing&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/1 - 4&lt;br /&gt;
 switchport mode access&lt;br /&gt;
 switchport access vlan 30&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 40&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/10&lt;br /&gt;
 no switchport&lt;br /&gt;
 ip address 172.16.0.10 255.255.255.0&lt;br /&gt;
!&lt;br /&gt;
interface Vlan30&lt;br /&gt;
 ip address 10.0.0.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
interface Vlan40&lt;br /&gt;
 ip address 10.0.1.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://www.netacad.com/ Link til Cisco Netacad]&lt;br /&gt;
*[[ASC II]] - Koder for bogstaver og tal &lt;br /&gt;
*[https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Putty]  et gratis terminal emuleringssoftware&lt;br /&gt;
[[Category:Course]][[Category:Network]]&lt;br /&gt;
*[https://www.netacad.com/courses/ccna-introduction-networks?courseLang=en-US&amp;amp;instance_id=46a950b1-8175-474a-85fe-0e5e906a7f1a Introduction to networks]&lt;br /&gt;
*[https://www.youtube.com/watch?v=FIV2-44uTmw Fiber kabel lægning med skibet Resolute]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41682</id>
		<title>AMU HAMMR</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41682"/>
				<updated>2025-09-02T11:24:36Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Lag 2 switch */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Materialer anvendt=&lt;br /&gt;
== Uge 1==&lt;br /&gt;
[[Image:Agenda ascom.png|thumb|500px|none|Agenda]]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/01.01%20-%20Introduction%20to%20IP%20Generic%20diasshow.ppsx Network 1]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/02.01%20-%20Module%201%20Session%202%20diasshow.ppsx Network 2]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/03.01%20-%20Module%201%20Session%203%20diasshow.ppsx Network 3]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/04.01%20-%20Module%201%20Session%204%20diasshow.ppsx Network 4]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/05.01%20-%20Module%201%20Session%205%20diasshow.ppsx Network 5]&lt;br /&gt;
&lt;br /&gt;
==Subnetting==&lt;br /&gt;
[[File:23.1_-_SUBNET_eksempel.pdf| Subnet eksempel]]&lt;br /&gt;
== Router øvelse med nat==&lt;br /&gt;
=== Del 1 uden Trunking ===&lt;br /&gt;
Overordnet plan vi lagde:&lt;br /&gt;
Router grundkonfig:&lt;br /&gt;
#fa0/0 - DHCP (Anvend ISP'ens DHCP-server)&lt;br /&gt;
#Test: show ip int brief, ping 8.8.8.8&lt;br /&gt;
#fa0/1 - Statisk IP 172.16.0.1/24&lt;br /&gt;
#Test: show ip int br, ping 172.16.0.1&lt;br /&gt;
#Konfigurer NAT&lt;br /&gt;
#Test: ping 8.8.8.8 source 172.16.0.1&lt;br /&gt;
#Test: show ip nat translations&lt;br /&gt;
#Konfigurer DHCP på 172.16.0.0/24 scope&lt;br /&gt;
#Tilslut PC og test den får en ip&lt;br /&gt;
&lt;br /&gt;
Del 2:&lt;br /&gt;
- VLAN til Teacher og Student&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=== Del 1 med Trunking ===&lt;br /&gt;
====Router====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool TEACHER&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.1.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 no ip address&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.10&lt;br /&gt;
 encapsulation dot1Q 10&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.20&lt;br /&gt;
 encapsulation dot1Q 20&lt;br /&gt;
 ip address 172.16.1.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Lag 2 switch====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname Switch&lt;br /&gt;
&lt;br /&gt;
interface FastEthernet0/1&lt;br /&gt;
 switchport mode trunk&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/5 - 10&lt;br /&gt;
 switchport access vlan 10&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/11 - 19&lt;br /&gt;
 switchport access vlan 20&lt;br /&gt;
 switchport mode access&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Del 2 - med LAG 3 switch - statisk routening==&lt;br /&gt;
===SOHO Router===&lt;br /&gt;
Følgende ekstra konfiguration af SOHO Routeren er foretaget - udover det i del 1.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
!&lt;br /&gt;
ip dhcp excluded-address 10.0.1.1 10.0.1.9&lt;br /&gt;
ip dhcp excluded-address 10.0.0.1 10.0.0.9&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool GUEST&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.0.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool HACKERS&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.1.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.1.1&lt;br /&gt;
!&lt;br /&gt;
ip route 10.0.0.0 255.255.255.0 172.16.0.10&lt;br /&gt;
ip route 10.0.1.0 255.255.255.0 172.16.0.10&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
===Lag tre switch===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ip routing&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/1 - 4&lt;br /&gt;
 switchport mode access&lt;br /&gt;
 switchport access vlan 30&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 40&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/10&lt;br /&gt;
 no switchport&lt;br /&gt;
 ip address 172.16.0.10 255.255.255.0&lt;br /&gt;
!&lt;br /&gt;
interface Vlan30&lt;br /&gt;
 ip address 10.0.0.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
interface Vlan40&lt;br /&gt;
 ip address 10.0.1.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://www.netacad.com/ Link til Cisco Netacad]&lt;br /&gt;
*[[ASC II]] - Koder for bogstaver og tal &lt;br /&gt;
*[https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Putty]  et gratis terminal emuleringssoftware&lt;br /&gt;
[[Category:Course]][[Category:Network]]&lt;br /&gt;
*[https://www.netacad.com/courses/ccna-introduction-networks?courseLang=en-US&amp;amp;instance_id=46a950b1-8175-474a-85fe-0e5e906a7f1a Introduction to networks]&lt;br /&gt;
*[https://www.youtube.com/watch?v=FIV2-44uTmw Fiber kabel lægning med skibet Resolute]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41681</id>
		<title>AMU HAMMR</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41681"/>
				<updated>2025-09-02T10:45:38Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Router øvelse med nat */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Materialer anvendt=&lt;br /&gt;
== Uge 1==&lt;br /&gt;
[[Image:Agenda ascom.png|thumb|500px|none|Agenda]]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/01.01%20-%20Introduction%20to%20IP%20Generic%20diasshow.ppsx Network 1]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/02.01%20-%20Module%201%20Session%202%20diasshow.ppsx Network 2]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/03.01%20-%20Module%201%20Session%203%20diasshow.ppsx Network 3]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/04.01%20-%20Module%201%20Session%204%20diasshow.ppsx Network 4]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/05.01%20-%20Module%201%20Session%205%20diasshow.ppsx Network 5]&lt;br /&gt;
&lt;br /&gt;
==Subnetting==&lt;br /&gt;
[[File:23.1_-_SUBNET_eksempel.pdf| Subnet eksempel]]&lt;br /&gt;
== Router øvelse med nat==&lt;br /&gt;
=== Del 1 uden Trunking ===&lt;br /&gt;
Overordnet plan vi lagde:&lt;br /&gt;
Router grundkonfig:&lt;br /&gt;
#fa0/0 - DHCP (Anvend ISP'ens DHCP-server)&lt;br /&gt;
#Test: show ip int brief, ping 8.8.8.8&lt;br /&gt;
#fa0/1 - Statisk IP 172.16.0.1/24&lt;br /&gt;
#Test: show ip int br, ping 172.16.0.1&lt;br /&gt;
#Konfigurer NAT&lt;br /&gt;
#Test: ping 8.8.8.8 source 172.16.0.1&lt;br /&gt;
#Test: show ip nat translations&lt;br /&gt;
#Konfigurer DHCP på 172.16.0.0/24 scope&lt;br /&gt;
#Tilslut PC og test den får en ip&lt;br /&gt;
&lt;br /&gt;
Del 2:&lt;br /&gt;
- VLAN til Teacher og Student&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=== Del 1 med Trunking ===&lt;br /&gt;
====Router====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool TEACHER&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.1.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 no ip address&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.10&lt;br /&gt;
 encapsulation dot1Q 10&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.20&lt;br /&gt;
 encapsulation dot1Q 20&lt;br /&gt;
 ip address 172.16.1.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Lag 2 switch====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname Switch&lt;br /&gt;
&lt;br /&gt;
interface FastEthernet0/1&lt;br /&gt;
 switchport mode trunk&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 10&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/11 - 19&lt;br /&gt;
 switchport access vlan 20&lt;br /&gt;
 switchport mode access&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Del 2 - med LAG 3 switch - statisk routening==&lt;br /&gt;
===SOHO Router===&lt;br /&gt;
Følgende ekstra konfiguration af SOHO Routeren er foretaget - udover det i del 1.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
!&lt;br /&gt;
ip dhcp excluded-address 10.0.1.1 10.0.1.9&lt;br /&gt;
ip dhcp excluded-address 10.0.0.1 10.0.0.9&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool GUEST&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.0.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool HACKERS&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.1.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.1.1&lt;br /&gt;
!&lt;br /&gt;
ip route 10.0.0.0 255.255.255.0 172.16.0.10&lt;br /&gt;
ip route 10.0.1.0 255.255.255.0 172.16.0.10&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
===Lag tre switch===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ip routing&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/1 - 4&lt;br /&gt;
 switchport mode access&lt;br /&gt;
 switchport access vlan 30&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 40&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/10&lt;br /&gt;
 no switchport&lt;br /&gt;
 ip address 172.16.0.10 255.255.255.0&lt;br /&gt;
!&lt;br /&gt;
interface Vlan30&lt;br /&gt;
 ip address 10.0.0.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
interface Vlan40&lt;br /&gt;
 ip address 10.0.1.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://www.netacad.com/ Link til Cisco Netacad]&lt;br /&gt;
*[[ASC II]] - Koder for bogstaver og tal &lt;br /&gt;
*[https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Putty]  et gratis terminal emuleringssoftware&lt;br /&gt;
[[Category:Course]][[Category:Network]]&lt;br /&gt;
*[https://www.netacad.com/courses/ccna-introduction-networks?courseLang=en-US&amp;amp;instance_id=46a950b1-8175-474a-85fe-0e5e906a7f1a Introduction to networks]&lt;br /&gt;
*[https://www.youtube.com/watch?v=FIV2-44uTmw Fiber kabel lægning med skibet Resolute]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41680</id>
		<title>AMU HAMMR</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41680"/>
				<updated>2025-09-02T08:13:14Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Materialer anvendt=&lt;br /&gt;
== Uge 1==&lt;br /&gt;
[[Image:Agenda ascom.png|thumb|500px|none|Agenda]]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/01.01%20-%20Introduction%20to%20IP%20Generic%20diasshow.ppsx Network 1]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/02.01%20-%20Module%201%20Session%202%20diasshow.ppsx Network 2]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/03.01%20-%20Module%201%20Session%203%20diasshow.ppsx Network 3]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/04.01%20-%20Module%201%20Session%204%20diasshow.ppsx Network 4]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/05.01%20-%20Module%201%20Session%205%20diasshow.ppsx Network 5]&lt;br /&gt;
&lt;br /&gt;
==Subnetting==&lt;br /&gt;
[[File:23.1_-_SUBNET_eksempel.pdf| Subnet eksempel]]&lt;br /&gt;
== Router øvelse med nat==&lt;br /&gt;
=== Del 1 uden Trunking ===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=== Del 1 med Trunking ===&lt;br /&gt;
====Router====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool TEACHER&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.1.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 no ip address&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.10&lt;br /&gt;
 encapsulation dot1Q 10&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.20&lt;br /&gt;
 encapsulation dot1Q 20&lt;br /&gt;
 ip address 172.16.1.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Lag 2 switch====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname Switch&lt;br /&gt;
&lt;br /&gt;
interface FastEthernet0/1&lt;br /&gt;
 switchport mode trunk&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 10&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/11 - 19&lt;br /&gt;
 switchport access vlan 20&lt;br /&gt;
 switchport mode access&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Del 2 - med LAG 3 switch - statisk routening==&lt;br /&gt;
===SOHO Router===&lt;br /&gt;
Følgende ekstra konfiguration af SOHO Routeren er foretaget - udover det i del 1.&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
!&lt;br /&gt;
ip dhcp excluded-address 10.0.1.1 10.0.1.9&lt;br /&gt;
ip dhcp excluded-address 10.0.0.1 10.0.0.9&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool GUEST&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.0.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool HACKERS&lt;br /&gt;
 import all&lt;br /&gt;
 network 10.0.1.0 255.255.255.0&lt;br /&gt;
 default-router 10.0.1.1&lt;br /&gt;
!&lt;br /&gt;
ip route 10.0.0.0 255.255.255.0 172.16.0.10&lt;br /&gt;
ip route 10.0.1.0 255.255.255.0 172.16.0.10&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
===Lag tre switch===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ip routing&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/1 - 4&lt;br /&gt;
 switchport mode access&lt;br /&gt;
 switchport access vlan 30&lt;br /&gt;
!&lt;br /&gt;
interface range GigabitEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 40&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/10&lt;br /&gt;
 no switchport&lt;br /&gt;
 ip address 172.16.0.10 255.255.255.0&lt;br /&gt;
!&lt;br /&gt;
interface Vlan30&lt;br /&gt;
 ip address 10.0.0.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
interface Vlan40&lt;br /&gt;
 ip address 10.0.1.1 255.255.255.0&lt;br /&gt;
 ip helper-address 172.16.0.1&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://www.netacad.com/ Link til Cisco Netacad]&lt;br /&gt;
*[[ASC II]] - Koder for bogstaver og tal &lt;br /&gt;
*[https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Putty]  et gratis terminal emuleringssoftware&lt;br /&gt;
[[Category:Course]][[Category:Network]]&lt;br /&gt;
*[https://www.netacad.com/courses/ccna-introduction-networks?courseLang=en-US&amp;amp;instance_id=46a950b1-8175-474a-85fe-0e5e906a7f1a Introduction to networks]&lt;br /&gt;
*[https://www.youtube.com/watch?v=FIV2-44uTmw Fiber kabel lægning med skibet Resolute]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	<entry>
		<id>http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41679</id>
		<title>AMU HAMMR</title>
		<link rel="alternate" type="text/html" href="http://mars.merhot.dk/w/index.php?title=AMU_HAMMR&amp;diff=41679"/>
				<updated>2025-09-01T11:13:19Z</updated>
		
		<summary type="html">&lt;p&gt;Heth: /* =Lag 2 switch */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=Materialer anvendt=&lt;br /&gt;
== Uge 1==&lt;br /&gt;
[[Image:Agenda ascom.png|thumb|500px|none|Agenda]]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/01.01%20-%20Introduction%20to%20IP%20Generic%20diasshow.ppsx Network 1]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/02.01%20-%20Module%201%20Session%202%20diasshow.ppsx Network 2]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/03.01%20-%20Module%201%20Session%203%20diasshow.ppsx Network 3]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/04.01%20-%20Module%201%20Session%204%20diasshow.ppsx Network 4]&lt;br /&gt;
*[https://mars.merhot.dk/data/ascom/module1/05.01%20-%20Module%201%20Session%205%20diasshow.ppsx Network 5]&lt;br /&gt;
&lt;br /&gt;
==Subnetting==&lt;br /&gt;
[[File:23.1_-_SUBNET_eksempel.pdf| Subnet eksempel]]&lt;br /&gt;
== Router øvelse med nat==&lt;br /&gt;
=== Del 1 uden Trunking ===&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
!&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
=== Del 1 med Trunking ===&lt;br /&gt;
====Router====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname SOHO&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool STUDENTS&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.0.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.0.1&lt;br /&gt;
!&lt;br /&gt;
ip dhcp pool TEACHER&lt;br /&gt;
 import all&lt;br /&gt;
 network 172.16.1.0 255.255.255.0&lt;br /&gt;
 default-router 172.16.1.1&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/0&lt;br /&gt;
 description Outside&lt;br /&gt;
 ip address dhcp&lt;br /&gt;
 ip nat outside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1&lt;br /&gt;
 description Inside&lt;br /&gt;
 no ip address&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.10&lt;br /&gt;
 encapsulation dot1Q 10&lt;br /&gt;
 ip address 172.16.0.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
interface GigabitEthernet0/1.20&lt;br /&gt;
 encapsulation dot1Q 20&lt;br /&gt;
 ip address 172.16.1.1 255.255.255.0&lt;br /&gt;
 ip nat inside&lt;br /&gt;
!&lt;br /&gt;
ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;br /&gt;
!&lt;br /&gt;
access-list 1 permit 172.16.0.0 0.0.0.255&lt;br /&gt;
access-list 1 permit 172.16.1.0 0.0.0.255&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Lag 2 switch====&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
hostname Switch&lt;br /&gt;
&lt;br /&gt;
interface FastEthernet0/1&lt;br /&gt;
 switchport mode trunk&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/5 - 9&lt;br /&gt;
 switchport access vlan 10&lt;br /&gt;
 switchport mode access&lt;br /&gt;
!&lt;br /&gt;
interface range FastEthernet0/11 - 19&lt;br /&gt;
 switchport access vlan 20&lt;br /&gt;
 switchport mode access&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Links=&lt;br /&gt;
*[https://www.netacad.com/ Link til Cisco Netacad]&lt;br /&gt;
*[[ASC II]] - Koder for bogstaver og tal &lt;br /&gt;
*[https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Putty]  et gratis terminal emuleringssoftware&lt;br /&gt;
[[Category:Course]][[Category:Network]]&lt;br /&gt;
*[https://www.netacad.com/courses/ccna-introduction-networks?courseLang=en-US&amp;amp;instance_id=46a950b1-8175-474a-85fe-0e5e906a7f1a Introduction to networks]&lt;br /&gt;
*[https://www.youtube.com/watch?v=FIV2-44uTmw Fiber kabel lægning med skibet Resolute]&lt;/div&gt;</summary>
		<author><name>Heth</name></author>	</entry>

	</feed>