Find here what you want

How to Configure Telnet Server ????

telnet server is used to login into another system. You can use the telnet command to log in remotely to another system on your network. The system can be on your local area network or available through an Internet connection. Telnet operates as if you were logging in to another system from a remote terminal. You will be asked for a login name and password. In effect, you are logging in to another account on another system. In fact, if you have an account on another system, you could use Telnet to log in to it.
You invoke the Telnet utility with the keyword telnet. If you know the name of the site you want to connect with, you can enter telnet and the name of the site on the Linux command line.
CAUTION The original version of Telnet is noted for being very insecure. For secure connections over a network or the Internet, you should use the Secure Shell (SSH). We will cover SSH server in next article. SSH operate in the same way as the original but use authentication and encryption to secure the Telnet connection. Even so, it is advisable never to use Telnet to log in to your root account. That why by defaults root account is disable for root login.

Configure telnet server

In this example we will configure a telnet server and will invoke connection from client side.
For this example we are using three systems one linux server one linux clients and one window clients. To complete these per quest of telnet server Follow this link
  • A linux server with ip address 192.168.0.254 and hostname Server
  • A linux client with ip address 192.168.0.1 and hostname Client1
  • A windows xp system with ip address 192.168.0.2 and hostname Client2
  • Updated /etc/hosts file on both linux system
  • Running portmap and xinetd services
  • Firewall should be off on server
We have configured all these steps in our pervious article.
We suggest you to review that article before start configuration of telnet server. Once you have completed the necessary steps follow this guide.
Four rpm are required to configure telnet server. telnet, telnet-server, portmap, xinetd check them if not found then install
rpm
Now check telnet, portmap, xinetd service in system service it should be on

#setup
Select System service from list
[*]portmap
[*]xinetd
[*]telnet
Now restart xinetd and portmap service
service restart
To keep on these services after reboot on then via chkconfig command
chkconfig
After reboot verify their status. It must be in running condition
service status
Create a normal user named vinita
Your Ad Here

On Linux client

ping from telnet server and run telnet command and give user name and password
telnet form linux

On Window client

ping from telnet server and run telnet command
telnet
Give user name and password
user login

How to enable root login from telnet server

On linux server open file securetty
securetty
In the end of file add pts/0 to enable one telnet session for root. if you need to open more telnet session for root and add more pts/1 pts/2 and so on.
editing in securetty
Now restart xinetd and portmap service
service restart
Verfiy from window by login from root
root login telnet

How to recover formatted hard disk DATA ??

To recover data from a drive containing lost or missing partition, follow these steps:

First We recommend that you use professional partition recovery tool -
Partition Table Doctor to recover missing or lost partitions.



Symptoms


Where previously the computer would boot and be usable, systems that have been Formatted often report the following errors: (these errors are frequently displayed on a black screen with white text.)
  • Operating System not found
  • Invalid or corrupt FAT
  • Cannot find file or program
  • Invalid command.com
  • Primary/Secondary Hard disk failure
  • Non system disk
  • isk error
Or when a partition has been formatted, the all data would disappear.

To recover files from formatted drives, please follow this procedure:

1. Click the Select "FormatRecovery" button on the main window of Data Recovery Wizard.


2.The first screen on the "FormatRecovery" tool will display a list of partitions found on the drives found in your system. If your partition is not listed, this is a sign of more severe corruption. You may need to select the "AdvancedRecovery" tool to recover your data. If you are trying to
recover data from removable media, you need to have the media in the drive before selecting the "FormatRecovery " tool.

3. When you accidentally reformatted a partition you may have changed the partition type. The "
Previous File System" radio box will allow you to select the previous file system type for your partition.


4. To begin a formatted recovery, select a partition and click "Next" to begin scanning for Files. Data Recovery Wizard analyses the drive data structures and file system attributes and displays the directory tree.




5.After this scanning is finished, you'll see file/folder tree.



6. Select the file or directory that you want to recover and press the "
Next" button.

7.Select a directory and press the "
Next" button to save the data.

Note:
If you have repartitioned your drive and the partition size has been changed or moved, use the "AdvancedRecovery" tool.

Caution:
Saving file(s) to the partition or drive from where you are recovering data, for it may result in overwriting of data, and would result in permanent data loss!!!

How to set permission in windows 7

If you are windows vista user then you will be knowing the file ownership and permissions related issues and now it is extended to windows 7 too, but Windows XP users experimenting with Windows 7 might not know about this.
Windows 7 has implemented addition security mechanism to prevent accidental or intentional file or folder modification by not allowing users other then owner of file or folder to access it. Hence incase if you need to access, modify or delete such files or folder you need to take ownership first then assign rights or permission to respective users. Here is Guide on How to take Ownership and Grant Permission in Window 7.

How to Take Ownership in Windows 7

1. Locate the file or folder on which you want to take ownership in windows explorer
2. Right click on file or folder and select “Properties” from Context Menu
3. Click on Security tab
Windows 7 Files and Folder Security Tab
4. Click on “Advance”
5. Now click on Owner tab in Advance Security Settings for User windows
Owner Tab of Advance Security Settings
6. Click on Edit Button and select user from given Change Owner to list if user or group is not in given list then click on other users or groups. Enter name of user/group and click ok.
Other Users or Groups
8. Now select User/group and click apply and ok. (Check “Replace owner on subcontainers and objects” if you have files and folder within selected folder)
9. Click ok when Windows Security Prompt is displayed
Window Security Prompt
10. Now Owner name must have changed.
11. Now click Ok to exist from Properties windows
Once you have taken the ownership of file or folder next part comes is Granting Permissions to that file/folder or object.

How to Grant Permissions in Windows 7

1. Locate the file or folder on which you want to take ownership in windows explorer
2. Right click on file or folder and select “Properties” from Context Menu
3. Click on Edit button in Properties windows Click ok to confirm UAC elevation request.
4. Select user/group from permission windows or click add to add other user or group.
5. Now under Permission section check the rights which you want to grant i.e check “Full Control” under the “Allow” column to assign full access rights control permissions to Administrators group.
Change Permissions
6. Click Ok for changes to take effect and click ok final ok to exit from Properties window.

Computer tricksssssss.....

Windows XP Secrets

Create a log

  1. Open Notepad
  2. On the very first line, type in ".LOG" (without quotes) then press Enter for a new line
  3. Now you can type in some text if you want, then save the file.
  4. Next time when you open the file, notice its contents. Notepad automatically adds a time/date log everytime you open the file.
Text becomes unreadable
  1. Open Notepad
  2. On the very first line, type in "dont eat the donut" (without quotes) then save and close the file. Note: the file should have only one line of the text above.
  3. Now, open the same file. You'll notice the text becomes unreadable squares. (try this with different text with the same format and length).



    Paint Secrets

    Create a trail image
    1. Open Paint, then open an image.
    2. Right-click on the image and select "Select All"
    3. Now hold the "Shift" key and move the image around. The image will be drawn with trail.
    10x Zoom
    1. Open Paint, then open a small image.
    2. Select the zoom "Magnifier" tool.
    3. Windows Paint lists out the zoom options from 1x to 8x, but there is a 10x...
    4. After selecting the Magnifier tool, point the mouse right at the border line right under "8x" and left-click. There you go.. the hidden 10x.




      Other Secrets

      Where is the relaxing music that you've heard during Windows XP Installation?
    5. The file is in:
      C:\Windows\system32\oobe\images\title.wma



      Game Secrets

      Solitaire: Instant Win
    6. Press Alt + Shift + 2 to instantly win
    Solitaire: Draw only 1 card (instead of 3)
    1. Hold down Ctrl + Alt + Shift then click on unopen cards to draw.
    FreeCell: Instant Win
    1. Hold down Ctrl + Shift + F10 while playing, then click Abort.
    2. Now move one card.
    FreeCell: Hidden Game Modes
    1. Go to "Game" menu choose "Select Game"
    2. Here you can choose from game mode 1 to 1,000,000. But -1 and -2 will also work (hidden modes)
    Hearts: Show All Card
      Warning! this requires a modification on your registry. Be sure you follow the steps carefully. Damage your registry might damage your Windows.
    1. Open the "Registry Editor" by: "Start" >> "Run" then type "regedit" and press Enter
    2. Expand to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Hearts
    3. Right-click on the right panel and create a new String value with the name "ZB"
    4. Double-click to open this key "ZB" to edit its value. Then enter "42" and close the Registry Editor.
    5. Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards
    Minesweeper: Stop The Timer
    1. When you start to play a new game, the timer is ticking...
    2. Press Windows Key + D to show desktop.
    3. Now come back to the game by selecting it from the taskbar. The timer is stopped.
    Pinball
    1. Unlimited Balls: Type bmax at a new game to get unlimited balls (no notification).
    2. Extra Balls: Type 1max at a new game to get extra balls.
    3. Gravity Well: Type gmax at a new game to activate Gravity Well.
    4. Promotion: Type rmax at a new game or while playing to get instant promotion and raising rank.
    5. Extra points with partial shots: Partially shot the ball just to pass the yellow light bars. There are 6 bars. With the first bar, you'll get 15,000 points, 2nd: 30,000,...
    6. Extra points with partial shots: Partially shot the ball just to pass the yellow light bars. There are 6 bars. With the first bar, you'll get 15,000 points, 2nd: 30,000,...
    7. Test Mode: Type hidden test with a new ball or new game. Now you can use your mouse to drag and move the ball where you want.



Top 5 Antivirus

Now a days we see a lot of people are searching for a good antivirus. No wonder people are searching are the antivirus software’s, but the thing is they want a consistent and a free antivirus which updates regularly and catches new viruses as soon as they try to enter your system. The moment we talk about the antivirus,we will say go for either Kaspersky, BitDefender, Norton, ESET NOD 32 and etc. But all these antivirus software’s are a bit expensive. So how to protect your data with our buying a antivirus software? No problem at all.i have a list of free antivirus software’s which run for both Windows 7 and Windows Xp. These free antiviruses are not only free but also very consistent and worthy to use.


1) ESET Smart Security : Download link : Download

2) Avast : Download link : Download

3) Bit Defender : Download link: Download

4) Microsoft Security Essential : Download link: Download

5) Panda Cloud : Download link : Download


Enjoy these are Top 5 Antivirus and all links are For trial Version ... Well If you want Full Versions then it will be Illegal So I didn't mention Those links here .. So go ahead if you want to try these !!


Say Thank You now ...hahahahahah :P :P :P

Introduction and Troubleshooting of TCP/IP


Troubleshooting TCP/IP


The sections in this chapter describe common features of TCP/IP and provide solutions to some of the most common TCP/IP problems. The following items will be covered:
TCP/IP Introduction
Tools for Troubleshooting IP Problems
General IP Troubleshooting Theory and Suggestions
Troubleshooting Basic IP Connectivity
Troubleshooting Physical Connectivity Problems
Troubleshooting Layer 3 Problems
Troubleshooting Hot Standby Router Protocol (HSRP)

TCP/IP Introduction

In the mid-1970s, the Defense Advanced Research Projects Agency (DARPA) became interested in establishing a packet-switched network to provide communications between research institutions in the United States. DARPA and other government organizations understood the potential of packet-switched technology and were just beginning to face the problem that virtually all companies with networks now have—communication between dissimilar computer systems.
With the goal of heterogeneous connectivity in mind, DARPA funded research by Stanford University and Bolt, Beranek, and Newman (BBN) to create a series of communication protocols. The result of this development effort, completed in the late 1970s, was the Internet Protocol suite, of which the Transmission Control Protocol (TCP) and the Internet Protocol (IP) are the two best-known protocols.
The most widespread implementation of TCP/IP is IPv4 (or IP version 4). In 1995, a new standard, RFC 1883—which addressed some of the problems with IPv4, including address space limitations—was proposed. This new version is called IPv6. Although a lot of work has gone into developing IPv6, no wide-scale deployment has occurred; because of this, IPv6 has been excluded from this text.

Internet Protocols

Internet protocols can be used to communicate across any set of interconnected networks. They are equally well suited for local-area network (LAN) and wide-area network (WAN) communications. The Internet suite includes not only lower-layer specifications (such as TCP and IP), but also specifications for such common applications as e-mail, terminal emulation, and file transfer. Figure 7-1 shows some of the most important Internet protocols and their relationships to the OSI reference model.
As an interesting side note, the seven-layer model actually came about after TCP/IP. DARPA used a four-layer model instead, which the OSI later expanded to seven layers. This is why TCP/IP doesn't generally fit all that well into the seven-layer OSI model.
Figure 7-1 The Internet Protocol Suite and the OSI Reference Model
Creation and documentation of the Internet Protocol suite closely resemble an academic research project. The protocols are specified and refined in documents called Requests For Comments (RFCs), which are published, reviewed, and analyzed by the Internet community. Taken together, the RFCs provide a colorful history of the people, companies, and trends that have shaped the development of what is today the world's most popular open-system protocol suite.

The Network Layer

IP is the primary Layer 3 protocol in the TCP/IP suite. IP provides the logical addressing that enables communication across diverse networks. IP also provides fragmentation and reassembly of datagrams and error reporting. Along with TCP, IP represents the heart of the Internet Protocol suite. The IP packet format is shown in Figure 7-2.
Figure 7-2 The IP Packet Format
The fields of the IP packet are as follows:
Version—Indicates the version of this IP datagram.
IP Header Length (IHL)—Indicates the datagram header length in 32-bit words.
Type-of-Service—Specifies how a particular upper-layer protocol would like the current datagram to be handled. Datagrams can be assigned various levels of importance using this field.
Today this field is used primarily to provide quality of service (QoS) capabilities to TCP/IP for applications requiring predictable bandwidth or delay. RFC 2474 describes a method by which the TOS field is replaced by a DS field that is used to provide differentiated services (DiffServ) on networks. This field is split into two parts. The first 6 bits are used for the DSCP codepoint, which is used to differentiate traffic. The last 2 bits, or CU, are ignored by DiffServ-compliant nodes.
Total Length—Specifies the length of the entire IP packet, including data and header, in bytes.
Identification—Consists of an integer identifying this datagram. This field is used to help piece together datagram fragments.
Flags—Consists of 3 bits, of which the low-order 2 bits control fragmentation. One bit specifies whether the packet can be fragmented; the second bit specifies whether the packet is the last fragment in a series of fragmented packets.
Time-to-Live—Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly.
Protocol—Indicates which upper-layer protocol receives incoming packets after IP processing is complete.
Header Checksum—Helps ensure IP header integrity.
Source Address—Specifies the sending node.
Destination Address—Specifies the receiving node.
Options—Allows IP to support various options, such as security.
Data—Contains upper-layer information.

Addressing

As with all network layer protocols, the addressing scheme is integral to the process of routing IP datagrams through an internetwork. An IP address is 32 bits in length, divided into either two or three parts. The first part designates the network address, the second part (if present) designates the subnet address, and the final part designates the host address. Subnet addresses are present only if the network administrator has decided that the network should be divided into subnetworks. The lengths of the network, subnet, and host fields are all variable.
Today's Internet does not segment addresses along classful bounds—it is almost entirely classless. The separation between networks and subnets has been effectively eliminated. The requirement to understand network classes and the difference between a network and a subnet remains solely because of configuration and behavioral issues with network devices.
IP addressing supports five different network classes, and the high-order—far-left—bits indicate the network class:
Class A networks provide 8 bits for the Network Address field. The high-order bit (at far left) is 0.
Class B networks allocate 16 bits for the Network Address field and 16 bits for the Host Address field. This address class offers a good compromise between network and host address space. The first 2 high-order bits are 10.
Class C networks allocate 24 bits for the Network Address field. Class C networks provide only 8 bits for the Host field, however, so the number of hosts per network may be a limiting factor. The first 3 high-order bits are 110.
Class D addresses are reserved for multicast groups, as described formally in RFC 1112. The first 4 high-order bits are 1110.
Class E addresses are also defined by IP but are reserved for future use. The first 4 high-order bits are 1111.
IP addresses are written in dotted decimal format (for example, 34.10.2.1). Figure 7-3 shows the address formats for Class A, B, and C IP networks.
Figure 7-3 Class A, B, and C Address Formats
IP networks can also be divided into smaller units called subnets. Subnets provide extra flexibility for network administrators. For example, assume that a network has been assigned a Class B address, and all the nodes on the network currently conform to a Class B address format. Then assume that the dotted decimal representation of this network's address is 172.16.0.0 (all zeros in the Host field of an address specifies the entire network). Rather than change all the addresses to some other basic network number, the administrator can subdivide the network using subnetting. This is done by borrowing bits from the host portion of the address and using them as a subnet field, as shown in Figure 7-4.
Figure 7-4 Subnet Addresses
If a network administrator has chosen to use 8 bits of subnetting, the third octet of a Class B IP address provides the subnet number. For example, address 172.16.1.0 refers to network 172.16, subnet 1; address 172.16.2.0 refers to network 172.16, subnet 2; and so on. In today's world, the difference between subnet bits and the natural mask has become blurred, and you will often see only a prefix length that specifies the length of the entire mask (natural mask plus subnet bits). It is still important to understand the difference between the natural network mask, which is determined by the network class, and the subnet mask, because routers sometimes make assumptions based on the natural mask of an address. For example, the natural mask of 10.1.1.1/24 is 8 bits because this is a class A network, even though the subnet mask is 24 bits.
Subnet masks can be expressed in two forms: prefix length (as in /24), or dotted-decimal notation (As in 255.255.255.0). Both forms mean exactly the same thing and can easily be converted to the other, as seen in Example 7-1.
Example 7-1 Subnet Mask Expressed in Prefix Length and Dotted Decimal
255.255.255.0 = 11111111 11111111 11111111 00000000 = /24 bits (count the 
ones).

On some media (such as IEEE 802 LANs), the correlation between media addresses and IP addresses is dynamically discovered through the use of two other members of the Internet Protocol suite: the Address Resolution Protocol (ARP) and the Reverse Address Resolution Protocol (RARP). ARP uses broadcast messages to determine the hardware Media Access Control (MAC)-layer address corresponding to a particular IP address. ARP is sufficiently generic to allow use of IP with virtually any type of underlying media-access mechanism. RARP uses broadcast messages to determine the Internet address associated with a particular hardware address. RARP is particularly important to diskless nodes, which may not know their IP address when they boot.

Internet Routing

Routing devices in the Internet have traditionally been called gateways—an unfortunate term because elsewhere in the industry, the term gateway applies to a device with somewhat different functionality. Gateways (which we will call routers from this point on) within the Internet are organized hierarchically.
Dynamic routing protocols, such as RIP and OSPF, provide a means by which routers can communicate and share information about routes that they have learned or are connected to. This contrasts with static routing, in which routes are established by the network administrator and do not change unless they are manually altered. An IP routing table consists of destination address/next-hop pairs. A sample entry, shown in Figure 7-5, is interpreted as meaning, "To get to network 34.1.0.0 (subnet 1 on network 34), the next stop is the node at address 54.34.23.12."
Figure 7-5 An Example of an IP Routing Table
IP routing specifies that IP datagrams travel through internetworks one hop at a time; the entire route is not known at the outset of the journey. Instead, at each stop, the next destination is calculated by matching the destination address within the datagram with an entry in the current node's routing table. Each node's involvement in the routing process consists only of forwarding packets based on internal information, regardless of whether the packets get to their final destination. In other words, IP does not provide for error reporting back to the source when routing anomalies occur. This task is left to other Internet protocols, such as the Internet Control Message Protocol (ICMP) and TCP protocol.

ICMP

ICMP performs a number of tasks within an IP internetwork, the principal of which is reporting routing failures back to the source of a datagram. In addition, ICMP provides helpful messages such as the following:
Echo and reply messages to test node reachability across an internetwork
Redirect messages to stimulate more efficient routing
Time exceeded messages to inform sources that a datagram has exceeded its allocated time to exist within the internetwork
Router advertisement and router solicitation messages to determine the addresses of routers on directly attached subnetworks

The Transport Layer

The Internet transport layer is implemented by Transport Control Protocol (TCP) and the User Datagram Protocol (UDP). TCP provides connection-oriented data transport, whereas UDP operation is connectionless.

TCP

TCP provides full-duplex, acknowledged, and flow-controlled service to upper-layer protocols. It moves data in a continuous, unstructured byte stream in which bytes are identified by sequence numbers. TCP can support numerous simultaneous upper-layer conversations. The TCP packet format is shown in Figure 7-6.
Figure 7-6 The TCP Packet Format
The fields of the TCP packet are described here:
Source port and destination port—Identify the points (sockets) at which upper-layer source and destination processes receive TCP services.
Sequence number—Usually specifies the number assigned to the first byte of data in the current message. Under certain circumstances, it can also be used to identify an initial sequence number to be used in the upcoming transmission.
Acknowledgment number—Contains the sequence number of the next byte of data that the sender of the packet expects to receive.
Data offset—Indicates the number of 32-bit words in the TCP header.
Reserved—Is reserved for future use.
Flags—Carries a variety of control information.
Window—Specifies the size of the sender's receive window (buffer space available for incoming data).
Checksum—Provides information used to determine whether the header was damaged in transit.
Urgent pointer—Points to the first urgent data byte in the packet.
Options—Specifies various TCP options.
Data—Contains upper-layer information.

UDP

UDP is a much simpler protocol than TCP and is useful in situations in which the reliability mechanisms of TCP are not necessary. The UDP header has only four fields: Source Port, Destination Port, Length, and UDP Checksum. The Source and Destination Port fields serve the same functions as they do in the TCP header. The Length field specifies the length of the UDP header and data, and the UDP Checksum field allows packet integrity checking. The UDP checksum is optional.

Upper-Layer Protocols

The Internet Protocol suite includes many upper-layer protocols representing a wide variety of applications, including network management, file transfer, distributed file services, terminal emulation, and electronic mail. Table 7-1 maps the best-known Internet upper-layer protocols to the applications that they support.
Table 7-1 Internet Protocol/Application Mapping (with Common Port Numbers)
Application
Protocols
WWW browser
HTTP (TCP port 80)
The Hypertext Transfer Protocol (HTTP) is used by Web browsers and servers to transfer the files that make up web pages.
File transfer
FTP (TCP ports 20 and 21)
The File Transfer Protocol (FTP) provides a way to move files between computer systems. Telnet allows virtual terminal emulation.
Terminal emulation
Telnet (TCP port 23)
The Telnet protocol provides terminal emulation services over a reliable TCP stream. The Telnet protocol also specifies how a client and server should negotiate the use of certain features and options.
Electronic mail
SMTP (TCP port 25), POP3 (TCP port 110), IMAP4 (TCP port 143)
The Simple Mail Transfer Protocol (SMTP) is used to transfer electronic mail between mail servers, and is used by mail clients to send mail. Mail clients do not generally use SMTP to receive mail. Instead, they use either the Post Office Protocol version 3 (POP3) or the Internet Message Access Protocol (IMAP); this will be discussed in greater detail later in this chapter.
Network management
SNMP (UDP port 161)
The Simple Network Management Protocol (SNMP) is a network management protocol used for reporting anomalous network conditions and setting network threshold values.
Distributed file services
NFS, XDR, RPC (UDP port 111), X Windows (UDP ports 6000-6063)
X Windows is a popular protocol that permits intelligent terminals to communicate with remote computers as if they were directly attached. Network file system (NFS), external data representation (XDR), and remote-procedure call (RPC) combine to allow transparent access to remote network resources.

These and other network applications use the services of TCP/IP and other lower-layer Internet protocols to provide users with basic network services.

Domain Name System

TCP/IP uses a numeric addressing scheme in which each node is assigned an IP address that is used to route packets to a node on the network. Because it is much easier for people to remember names such as www.somedomain.com instead of 10.1.1.1, a protocol called Domain Name System (DNS) is used to map numbers to names, and vice versa. Most web pages refer to other web pages or links using these names instead of their IP addresses. This provides many advantages; for example, the address can change without breaking any links to a web page if the DNS table is also changed to point to the new address.

Tools for Troubleshooting IP Problems

The tools ping and traceroute, both in the TCP/IP protocol suite, will greatly assist in troubleshooting IP connectivity. Most operating systems and IP implementations come with these tools installed by default. On some UNIX platforms, however, you may need to download and install a traceroute package.
Cisco routers provide a basic method of viewing IP traffic switched through the router called packet debugging. Packet debugging enables a user to determine whether traffic is travelling along an expected path in the network or whether there are errors in a particular TCP stream. Although in some cases packet debugging can eliminate the need for a packet analyzer, it should not be considered a replacement for this important tool.
Packet debugging can be very intrusive—in some cases, it can cause a router to become inoperable until physically reset. In other instances, packets that are present on the network and switched through the router may not be reported by packet debugging. Thus, a firm conclusion cannot be drawn that a packet was not sent solely from the output of packet debugging; a network analyzer must be used to accurately make this assessment. Packet debugging should be used with extreme caution by only advanced operators because it can cause the router to lock up and stop routing traffic, if not used carefully. The risks of using packet debugging may be compounded by the necessity of disabling fast switching for packet debugging to be effective. As a general rule, packet debugging should not be used on a production router unless you have physical access to the router and are willing to risk it going down.