<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kalarsford</id>
	<title>ITCwiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kalarsford"/>
	<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/w/Special:Contributions/Kalarsford"/>
	<updated>2026-05-08T23:25:30Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.38.5</generator>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2039</id>
		<title>IEEE 802.1x Port-Based Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2039"/>
		<updated>2010-05-12T15:59:37Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;IEEE 802.1x Port-Based Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IEEE 802.1x is a standard for port-based network access control.  It is an authentication method for devices attempting to connect to a LAN.  It&#039;s purpose is to prevent unauthorized devices from joining and accessing resources on the network.  &lt;br /&gt;
&lt;br /&gt;
802.1x authentication involves 3 devices:&lt;br /&gt;
&lt;br /&gt;
1.  Client device&lt;br /&gt;
&lt;br /&gt;
2.  Authenticator&lt;br /&gt;
&lt;br /&gt;
3.  Authentication Server &lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;client device&#039;&#039;&#039;, a laptop for example, must be running client software compliant with IEEE 802.1x.  Windows XP, Windows Vista and Windows 7 all offer such software.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authenticator&#039;&#039;&#039; can be a ethernet switch and can also come in the form of a wireless access point.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authentication server&#039;&#039;&#039; is usually a host running software that supports both RADIUS and EAP protocols.&lt;br /&gt;
&lt;br /&gt;
EAP = Extensible Authentication Protocol&lt;br /&gt;
RADIUS = Remote Authentication Dial In User Service networking protocol&lt;br /&gt;
&lt;br /&gt;
The authenticator prevents the client device from accessing the network until the client device&#039;s identity has been authorized.  The client device will need to provide credentials, such as a username &amp;amp; password, to the authenticator.  The authenticator will forward the credentials to the authentication server for verification.  If the credentials supplied are deemed to be valid by the authentication server, the client is allowed to access the network&lt;br /&gt;
&lt;br /&gt;
Once a client device is plugged into a port on the switch (authenticator) the authentication process may begin.  The authenticator will transmit EAP-Request Identity frames to the client device.  (The client can also initiate authentication by sending a EAPOL-Start frame to the authenticator.  The autheticator would then reply with an EAP-Request Identity frame).  The client device will respond with a EAP-Response Identity frame that contains identity information such as a username and password.  The authenticator will send the response from the client to the authentication server in the form of a RADIUS Access Request packet.  At this point the authentication server and client must agree upon an EAP method to use for authentication.  Once an agreement is made, EAP requests and Responses are sent between the client and server until the server responds with an EAP-Success message or an EAP-Failure message.  Once authentication is successful the authenticator sets the port in the authorized state and traffic is allowed.  If authentication is not successful, the port remains in a unauthorized state.  When the client decides to log off, it will then send an EAPOL-logoff message to the authenticator and the port is once again set to a unauthorized state.    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SWITCH CONFIGURATION for IEEE 802.1x Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 1:  Enter global configuration mode&lt;br /&gt;
&lt;br /&gt;
Switch# &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
Step 2:  Enable AAA&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa new-model&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 3:  Create an IEEE 802.1x authentication method list&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa authentication dot1x group radius&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 4:  Enable IEEE 802.1x authentication globally on the switch&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;dot1x system-auth-control&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 5:  Specify the port connected to the client that you want enabled for IEEE 802.1x authentication&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;interface fa0/6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 6:  Enable IEEE 802.1x authentication on the port&lt;br /&gt;
&lt;br /&gt;
Switch(config-if)# &#039;&#039;&#039;dot1x port-control auto&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Use the &amp;quot;&#039;&#039;&#039;show dot1x&#039;&#039;&#039;&amp;quot; command to verify the entries you made and save your configurations.&lt;br /&gt;
&lt;br /&gt;
The following command must also be added to the switch for communication with the Radius Server (authentication server).  The command is &#039;&#039;&#039;&amp;quot;radius-server host (hostname | ip address) auth-port (port-number) key (string)&#039;&#039;&#039;.  Either a hostname or ip address may be entered.  For the auth-port, you need to specify the UDP destination port for authentication requests within the range of 0 to 65536.  The key string is a text string that must be the same as the encryption key used on the radius server.  Below is an example configuration.&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;radius-server host 172.16.0.1 auth-port 1520 key ccna123&lt;br /&gt;
&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2035</id>
		<title>IEEE 802.1x Port-Based Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2035"/>
		<updated>2010-05-12T02:07:44Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;IEEE 802.1x Port-Based Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IEEE 802.1x is a standard for port-based network access control.  It is an authentication method for devices attempting to connect to a LAN.  It&#039;s purpose is to prevent unauthorized devices from joining and accessing resources on the network.  &lt;br /&gt;
&lt;br /&gt;
802.1x authentication involves 3 devices:&lt;br /&gt;
&lt;br /&gt;
1.  Client device&lt;br /&gt;
&lt;br /&gt;
2.  Authenticator&lt;br /&gt;
&lt;br /&gt;
3.  Authentication Server &lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;client device&#039;&#039;&#039;, a laptop for example, must be running client software compliant with IEEE 802.1x.  Windows XP, Windows Vista and Windows 7 all offer such software.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authenticator&#039;&#039;&#039; can be a ethernet switch and can also come in the form of a wireless access point.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authentication server&#039;&#039;&#039; is usually a host running software that supports both RADIUS and EAP protocols.&lt;br /&gt;
&lt;br /&gt;
EAP = Extensible Authentication Protocol&lt;br /&gt;
RADIUS = Remote Authentication Dial In User Service networking protocol&lt;br /&gt;
&lt;br /&gt;
The authenticator prevents the client device from accessing the network until the client device&#039;s identity has been authorized.  The client device will need to provide credentials, such as a username &amp;amp; password, to the authenticator.  The authenticator will forward the credentials to the authentication server for verification.  If the credentials supplied are deemed to be valid by the authentication server, the client is allowed to access the network&lt;br /&gt;
&lt;br /&gt;
Once a client device is plugged into a port on the switch (authenticator) the authentication process may begin.  The authenticator will transmit EAP-Request Identity frames to the client device.  (The client can also initiate authentication by sending a EAPOL-Start frame to the authenticator.  The autheticator would then reply with an EAP-Request Identity frame).  The client device will respond with a EAP-Response Identity frame that contains identity information such as a username and password.  The authenticator will send the response from the client to the authentication server in the form of a RADIUS Access Request packet.  At this point the authentication server and client must agree upon an EAP method to use for authentication.  Once an agreement is made, EAP requests and Responses are sent between the client and server until the server responds with an EAP-Success message or an EAP-Failure message.  Once authentication is successful the authenticator sets the port in the authorized state and traffic is allowed.  If authentication is not successful, the port remains in a unauthorized state.  When the client decides to log off, it will then send an EAPOL-logoff message to the authenticator and the port is once again set to a unauthorized state.    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SWITCH CONFIGURATION for IEEE 802.1x Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 1:  Enter global configuration mode&lt;br /&gt;
&lt;br /&gt;
Switch# &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
Step 2:  Enable AAA&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa new-model&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 3:  Create an IEEE 802.1x authentication method list&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa authentication dot1x group radius&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 4:  Enable IEEE 802.1x authentication globally on the switch&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;dot1x system-auth-control&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 5:  Specify the port connected to the client that you want enabled for IEEE 802.1x authentication&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;interface fa0/6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 6:  Enable IEEE 802.1x authentication on the port&lt;br /&gt;
&lt;br /&gt;
Switch(config-if)# &#039;&#039;&#039;dot1x port-control auto&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Use the &amp;quot;&#039;&#039;&#039;show dot1x&#039;&#039;&#039;&amp;quot; command to verify the entries you made and save your configurations.&lt;br /&gt;
&lt;br /&gt;
The following command must also be added to the switch for communication with the Radius Server (authentication server).  The command is &#039;&#039;&#039;&amp;quot;radius-server host (hostname | ip address) auth-port (port-number) key (string)&#039;&#039;&#039;.  Either a hostname or ip address may be entered.  For the auth-port, you are to specify the UDP destination port for authentication requests from a range of 0 to 65536.  The key string is a text string that must match the encryption key used on the radius server.  Below is an example configuration.&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;radius-server host 172.16.0.1 auth-port 1520 key ccna123&lt;br /&gt;
&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2034</id>
		<title>IEEE 802.1x Port-Based Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2034"/>
		<updated>2010-05-12T02:07:12Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;IEEE 802.1x Port-Based Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IEEE 802.1x is a standard for port-based network access control.  It is an authentication method for devices attempting to connect to a LAN.  It&#039;s purpose is to prevent unauthorized devices from joining and accessing resources on the network.  &lt;br /&gt;
&lt;br /&gt;
802.1x authentication involves 3 devices:&lt;br /&gt;
&lt;br /&gt;
1.  Client device&lt;br /&gt;
&lt;br /&gt;
2.  Authenticator&lt;br /&gt;
&lt;br /&gt;
3.  Authentication Server &lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;client device&#039;&#039;&#039;, for example a laptop, must be running client software compliant with IEEE 802.1x.  Windows XP, Windows Vista and Windows 7 all offer such software.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authenticator&#039;&#039;&#039; can be a ethernet switch and can also come in the form of a wireless access point.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authentication server&#039;&#039;&#039; is usually a host running software that supports both RADIUS and EAP protocols.&lt;br /&gt;
&lt;br /&gt;
EAP = Extensible Authentication Protocol&lt;br /&gt;
RADIUS = Remote Authentication Dial In User Service networking protocol&lt;br /&gt;
&lt;br /&gt;
The authenticator prevents the client device from accessing the network until the client device&#039;s identity has been authorized.  The client device will need to provide credentials, such as a username &amp;amp; password, to the authenticator.  The authenticator will forward the credentials to the authentication server for verification.  If the credentials supplied are deemed to be valid by the authentication server, the client is allowed to access the network&lt;br /&gt;
&lt;br /&gt;
Once a client device is plugged into a port on the switch (authenticator) the authentication process may begin.  The authenticator will transmit EAP-Request Identity frames to the client device.  (The client can also initiate authentication by sending a EAPOL-Start frame to the authenticator.  The autheticator would then reply with an EAP-Request Identity frame).  The client device will respond with a EAP-Response Identity frame that contains identity information such as a username and password.  The authenticator will send the response from the client to the authentication server in the form of a RADIUS Access Request packet.  At this point the authentication server and client must agree upon an EAP method to use for authentication.  Once an agreement is made, EAP requests and Responses are sent between the client and server until the server responds with an EAP-Success message or an EAP-Failure message.  Once authentication is successful the authenticator sets the port in the authorized state and traffic is allowed.  If authentication is not successful, the port remains in a unauthorized state.  When the client decides to log off, it will then send an EAPOL-logoff message to the authenticator and the port is once again set to a unauthorized state.    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SWITCH CONFIGURATION for IEEE 802.1x Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 1:  Enter global configuration mode&lt;br /&gt;
&lt;br /&gt;
Switch# &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
Step 2:  Enable AAA&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa new-model&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 3:  Create an IEEE 802.1x authentication method list&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa authentication dot1x group radius&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 4:  Enable IEEE 802.1x authentication globally on the switch&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;dot1x system-auth-control&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 5:  Specify the port connected to the client that you want enabled for IEEE 802.1x authentication&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;interface fa0/6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 6:  Enable IEEE 802.1x authentication on the port&lt;br /&gt;
&lt;br /&gt;
Switch(config-if)# &#039;&#039;&#039;dot1x port-control auto&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Use the &amp;quot;&#039;&#039;&#039;show dot1x&#039;&#039;&#039;&amp;quot; command to verify the entries you made and save your configurations.&lt;br /&gt;
&lt;br /&gt;
The following command must also be added to the switch for communication with the Radius Server (authentication server).  The command is &#039;&#039;&#039;&amp;quot;radius-server host (hostname | ip address) auth-port (port-number) key (string)&#039;&#039;&#039;.  Either a hostname or ip address may be entered.  For the auth-port, you are to specify the UDP destination port for authentication requests from a range of 0 to 65536.  The key string is a text string that must match the encryption key used on the radius server.  Below is an example configuration.&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;radius-server host 172.16.0.1 auth-port 1520 key ccna123&lt;br /&gt;
&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2033</id>
		<title>IEEE 802.1x Port-Based Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2033"/>
		<updated>2010-05-12T02:06:41Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;IEEE 802.1x Port-Based Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IEEE 802.1x is a standard for port-based network access control.  It is an authentication method for devices attempting to connect to a LAN.  It&#039;s purpose is to prevent unauthorized devices from joining and accessing resources on the network.  &lt;br /&gt;
&lt;br /&gt;
802.1x authentication involves 3 devices:&lt;br /&gt;
&lt;br /&gt;
1.  client device&lt;br /&gt;
&lt;br /&gt;
2.  Authenticator&lt;br /&gt;
&lt;br /&gt;
3.  Authentication Server &lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;client device&#039;&#039;&#039;, for example a laptop, must be running client software compliant with IEEE 802.1x.  Windows XP, Windows Vista and Windows 7 all offer such software.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authenticator&#039;&#039;&#039; can be a ethernet switch and can also come in the form of a wireless access point.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authentication server&#039;&#039;&#039; is usually a host running software that supports both RADIUS and EAP protocols.&lt;br /&gt;
&lt;br /&gt;
EAP = Extensible Authentication Protocol&lt;br /&gt;
RADIUS = Remote Authentication Dial In User Service networking protocol&lt;br /&gt;
&lt;br /&gt;
The authenticator prevents the client device from accessing the network until the client device&#039;s identity has been authorized.  The client device will need to provide credentials, such as a username &amp;amp; password, to the authenticator.  The authenticator will forward the credentials to the authentication server for verification.  If the credentials supplied are deemed to be valid by the authentication server, the client is allowed to access the network&lt;br /&gt;
&lt;br /&gt;
Once a client device is plugged into a port on the switch (authenticator) the authentication process may begin.  The authenticator will transmit EAP-Request Identity frames to the client device.  (The client can also initiate authentication by sending a EAPOL-Start frame to the authenticator.  The autheticator would then reply with an EAP-Request Identity frame).  The client device will respond with a EAP-Response Identity frame that contains identity information such as a username and password.  The authenticator will send the response from the client to the authentication server in the form of a RADIUS Access Request packet.  At this point the authentication server and client must agree upon an EAP method to use for authentication.  Once an agreement is made, EAP requests and Responses are sent between the client and server until the server responds with an EAP-Success message or an EAP-Failure message.  Once authentication is successful the authenticator sets the port in the authorized state and traffic is allowed.  If authentication is not successful, the port remains in a unauthorized state.  When the client decides to log off, it will then send an EAPOL-logoff message to the authenticator and the port is once again set to a unauthorized state.    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SWITCH CONFIGURATION for IEEE 802.1x Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 1:  Enter global configuration mode&lt;br /&gt;
&lt;br /&gt;
Switch# &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
Step 2:  Enable AAA&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa new-model&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 3:  Create an IEEE 802.1x authentication method list&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa authentication dot1x group radius&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 4:  Enable IEEE 802.1x authentication globally on the switch&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;dot1x system-auth-control&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 5:  Specify the port connected to the client that you want enabled for IEEE 802.1x authentication&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;interface fa0/6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 6:  Enable IEEE 802.1x authentication on the port&lt;br /&gt;
&lt;br /&gt;
Switch(config-if)# &#039;&#039;&#039;dot1x port-control auto&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Use the &amp;quot;&#039;&#039;&#039;show dot1x&#039;&#039;&#039;&amp;quot; command to verify the entries you made and save your configurations.&lt;br /&gt;
&lt;br /&gt;
The following command must also be added to the switch for communication with the Radius Server (authentication server).  The command is &#039;&#039;&#039;&amp;quot;radius-server host (hostname | ip address) auth-port (port-number) key (string)&#039;&#039;&#039;.  Either a hostname or ip address may be entered.  For the auth-port, you are to specify the UDP destination port for authentication requests from a range of 0 to 65536.  The key string is a text string that must match the encryption key used on the radius server.  Below is an example configuration.&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;radius-server host 172.16.0.1 auth-port 1520 key ccna123&lt;br /&gt;
&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2032</id>
		<title>IEEE 802.1x Port-Based Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2032"/>
		<updated>2010-05-12T02:06:02Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;IEEE 802.1x Port-Based Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IEEE 802.1x is a standard for port-based network access control.  It is an authentication method for devices attempting to connect to a LAN.  It&#039;s purpose is to prevent unauthorized devices from joining and accessing resources on the network.  &lt;br /&gt;
&lt;br /&gt;
802.1x authentication involves 3 devices.&lt;br /&gt;
&lt;br /&gt;
1.  A client device&lt;br /&gt;
2.  A Authenticator&lt;br /&gt;
3.  A Authentication Server &lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;client device&#039;&#039;&#039;, for example a laptop, must be running client software compliant with IEEE 802.1x.  Windows XP, Windows Vista and Windows 7 all offer such software.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authenticator&#039;&#039;&#039; can be a ethernet switch and can also come in the form of a wireless access point.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authentication server&#039;&#039;&#039; is usually a host running software that supports both RADIUS and EAP protocols.&lt;br /&gt;
&lt;br /&gt;
EAP = Extensible Authentication Protocol&lt;br /&gt;
RADIUS = Remote Authentication Dial In User Service networking protocol&lt;br /&gt;
&lt;br /&gt;
The authenticator prevents the client device from accessing the network until the client device&#039;s identity has been authorized.  The client device will need to provide credentials, such as a username &amp;amp; password, to the authenticator.  The authenticator will forward the credentials to the authentication server for verification.  If the credentials supplied are deemed to be valid by the authentication server, the client is allowed to access the network&lt;br /&gt;
&lt;br /&gt;
Once a client device is plugged into a port on the switch (authenticator) the authentication process may begin.  The authenticator will transmit EAP-Request Identity frames to the client device.  (The client can also initiate authentication by sending a EAPOL-Start frame to the authenticator.  The autheticator would then reply with an EAP-Request Identity frame).  The client device will respond with a EAP-Response Identity frame that contains identity information such as a username and password.  The authenticator will send the response from the client to the authentication server in the form of a RADIUS Access Request packet.  At this point the authentication server and client must agree upon an EAP method to use for authentication.  Once an agreement is made, EAP requests and Responses are sent between the client and server until the server responds with an EAP-Success message or an EAP-Failure message.  Once authentication is successful the authenticator sets the port in the authorized state and traffic is allowed.  If authentication is not successful, the port remains in a unauthorized state.  When the client decides to log off, it will then send an EAPOL-logoff message to the authenticator and the port is once again set to a unauthorized state.    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SWITCH CONFIGURATION for IEEE 802.1x Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 1:  Enter global configuration mode&lt;br /&gt;
&lt;br /&gt;
Switch# &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
Step 2:  Enable AAA&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa new-model&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 3:  Create an IEEE 802.1x authentication method list&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa authentication dot1x group radius&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 4:  Enable IEEE 802.1x authentication globally on the switch&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;dot1x system-auth-control&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 5:  Specify the port connected to the client that you want enabled for IEEE 802.1x authentication&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;interface fa0/6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 6:  Enable IEEE 802.1x authentication on the port&lt;br /&gt;
&lt;br /&gt;
Switch(config-if)# &#039;&#039;&#039;dot1x port-control auto&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Use the &amp;quot;&#039;&#039;&#039;show dot1x&#039;&#039;&#039;&amp;quot; command to verify the entries you made and save your configurations.&lt;br /&gt;
&lt;br /&gt;
The following command must also be added to the switch for communication with the Radius Server (authentication server).  The command is &#039;&#039;&#039;&amp;quot;radius-server host (hostname | ip address) auth-port (port-number) key (string)&#039;&#039;&#039;.  Either a hostname or ip address may be entered.  For the auth-port, you are to specify the UDP destination port for authentication requests from a range of 0 to 65536.  The key string is a text string that must match the encryption key used on the radius server.  Below is an example configuration.&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;radius-server host 172.16.0.1 auth-port 1520 key ccna123&lt;br /&gt;
&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2031</id>
		<title>IEEE 802.1x Port-Based Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2031"/>
		<updated>2010-05-12T02:05:31Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;IEEE 802.1x Port-Based Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IEEE 802.1x is a standard for port-based network access control.  It is an authentication method for devices attempting to connect to a LAN.  It&#039;s purpose is to prevent unauthorized devices from joining and accessing resources on the network.  &lt;br /&gt;
&lt;br /&gt;
802.1x authentication involves 3 devices:&lt;br /&gt;
&lt;br /&gt;
1.  A client device&lt;br /&gt;
2.  A Authenticator&lt;br /&gt;
3.  A Authentication Server &lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;client device&#039;&#039;&#039;, for example a laptop, must be running client software compliant with IEEE 802.1x.  Windows XP, Windows Vista and Windows 7 all offer such software.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authenticator&#039;&#039;&#039; can be a ethernet switch and can also come in the form of a wireless access point.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authentication server&#039;&#039;&#039; is usually a host running software that supports both RADIUS and EAP protocols.&lt;br /&gt;
&lt;br /&gt;
EAP = Extensible Authentication Protocol&lt;br /&gt;
RADIUS = Remote Authentication Dial In User Service networking protocol&lt;br /&gt;
&lt;br /&gt;
The authenticator prevents the client device from accessing the network until the client device&#039;s identity has been authorized.  The client device will need to provide credentials, such as a username &amp;amp; password, to the authenticator.  The authenticator will forward the credentials to the authentication server for verification.  If the credentials supplied are deemed to be valid by the authentication server, the client is allowed to access the network&lt;br /&gt;
&lt;br /&gt;
Once a client device is plugged into a port on the switch (authenticator) the authentication process may begin.  The authenticator will transmit EAP-Request Identity frames to the client device.  (The client can also initiate authentication by sending a EAPOL-Start frame to the authenticator.  The autheticator would then reply with an EAP-Request Identity frame).  The client device will respond with a EAP-Response Identity frame that contains identity information such as a username and password.  The authenticator will send the response from the client to the authentication server in the form of a RADIUS Access Request packet.  At this point the authentication server and client must agree upon an EAP method to use for authentication.  Once an agreement is made, EAP requests and Responses are sent between the client and server until the server responds with an EAP-Success message or an EAP-Failure message.  Once authentication is successful the authenticator sets the port in the authorized state and traffic is allowed.  If authentication is not successful, the port remains in a unauthorized state.  When the client decides to log off, it will then send an EAPOL-logoff message to the authenticator and the port is once again set to a unauthorized state.    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SWITCH CONFIGURATION for IEEE 802.1x Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 1:  Enter global configuration mode&lt;br /&gt;
&lt;br /&gt;
Switch# &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
Step 2:  Enable AAA&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa new-model&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 3:  Create an IEEE 802.1x authentication method list&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa authentication dot1x group radius&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 4:  Enable IEEE 802.1x authentication globally on the switch&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;dot1x system-auth-control&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 5:  Specify the port connected to the client that you want enabled for IEEE 802.1x authentication&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;interface fa0/6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 6:  Enable IEEE 802.1x authentication on the port&lt;br /&gt;
&lt;br /&gt;
Switch(config-if)# &#039;&#039;&#039;dot1x port-control auto&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Use the &amp;quot;&#039;&#039;&#039;show dot1x&#039;&#039;&#039;&amp;quot; command to verify the entries you made and save your configurations.&lt;br /&gt;
&lt;br /&gt;
The following command must also be added to the switch for communication with the Radius Server (authentication server).  The command is &#039;&#039;&#039;&amp;quot;radius-server host (hostname | ip address) auth-port (port-number) key (string)&#039;&#039;&#039;.  Either a hostname or ip address may be entered.  For the auth-port, you are to specify the UDP destination port for authentication requests from a range of 0 to 65536.  The key string is a text string that must match the encryption key used on the radius server.  Below is an example configuration.&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;radius-server host 172.16.0.1 auth-port 1520 key ccna123&lt;br /&gt;
&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2030</id>
		<title>IEEE 802.1x Port-Based Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IEEE_802.1x_Port-Based_Authentication&amp;diff=2030"/>
		<updated>2010-05-12T02:01:29Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: Created page with &amp;#039;&amp;#039;&amp;#039;&amp;#039;IEEE 802.1x Port-Based Authentication&amp;#039;&amp;#039;&amp;#039;  IEEE 802.1x is a standard for port-based network access control.  It is an authentication method for devices attempting to connect to…&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;IEEE 802.1x Port-Based Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IEEE 802.1x is a standard for port-based network access control.  It is an authentication method for devices attempting to connect to a LAN.  It&#039;s purpose is to prevent unauthorized devices from joining and accessing resources on the network.  &lt;br /&gt;
&lt;br /&gt;
802.1x authentication involves 3 devices: &lt;br /&gt;
&lt;br /&gt;
1.  Client Device &lt;br /&gt;
2.  Authentication Server &lt;br /&gt;
3.  Authenticator&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;client device&#039;&#039;&#039;, for example a laptop, must be running client software compliant with IEEE 802.1x.  Windows XP, Windows Vista and Windows 7 all offer such software.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authenticator&#039;&#039;&#039; can be a ethernet switch and can also come in the form of a wireless access point.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;authentication server&#039;&#039;&#039; is usually a host running software that supports both RADIUS and EAP protocols.&lt;br /&gt;
&lt;br /&gt;
EAP = Extensible Authentication Protocol&lt;br /&gt;
RADIUS = Remote Authentication Dial In User Service networking protocol&lt;br /&gt;
&lt;br /&gt;
The authenticator prevents the client device from accessing the network until the client device&#039;s identity has been authorized.  The client device will need to provide credentials, such as a username &amp;amp; password, to the authenticator.  The authenticator will forward the credentials to the authentication server for verification.  If the credentials supplied are deemed to be valid by the authentication server, the client is allowed to access the network&lt;br /&gt;
&lt;br /&gt;
Once a client device is plugged into a port on the switch (authenticator) the authentication process may begin.  The authenticator will transmit EAP-Request Identity frames to the client device.  (The client can also initiate authentication by sending a EAPOL-Start frame to the authenticator.  The autheticator would then reply with an EAP-Request Identity frame).  The client device will respond with a EAP-Response Identity frame that contains identity information such as a username and password.  The authenticator will send the response from the client to the authentication server in the form of a RADIUS Access Request packet.  At this point the authentication server and client must agree upon an EAP method to use for authentication.  Once an agreement is made, EAP requests and Responses are sent between the client and server until the server responds with an EAP-Success message or an EAP-Failure message.  Once authentication is successful the authenticator sets the port in the authorized state and traffic is allowed.  If authentication is not successful, the port remains in a unauthorized state.  When the client decides to log off, it will then send an EAPOL-logoff message to the authenticator and the port is once again set to a unauthorized state.    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SWITCH CONFIGURATION for IEEE 802.1x Authentication&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 1:  Enter global configuration mode&lt;br /&gt;
&lt;br /&gt;
Switch# &#039;&#039;&#039;configure terminal&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
Step 2:  Enable AAA&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa new-model&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 3:  Create an IEEE 802.1x authentication method list&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;aaa authentication dot1x group radius&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 4:  Enable IEEE 802.1x authentication globally on the switch&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;dot1x system-auth-control&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 5:  Specify the port connected to the client that you want enabled for IEEE 802.1x authentication&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;interface fa0/6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Step 6:  Enable IEEE 802.1x authentication on the port&lt;br /&gt;
&lt;br /&gt;
Switch(config-if)# &#039;&#039;&#039;dot1x port-control auto&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Use the &amp;quot;&#039;&#039;&#039;show dot1x&#039;&#039;&#039;&amp;quot; command to verify the entries you made and save your configurations.&lt;br /&gt;
&lt;br /&gt;
The following command must also be added to the switch for communication with the Radius Server (authentication server).  The command is &#039;&#039;&#039;&amp;quot;radius-server host (hostname | ip address) auth-port (port-number) key (string)&#039;&#039;&#039;.  Either a hostname or ip address may be entered.  For the auth-port, you are to specify the UDP destination port for authentication requests from a range of 0 to 65536.  The key string is a text string that must match the encryption key used on the radius server.  Below is an example configuration.&lt;br /&gt;
&lt;br /&gt;
Switch(config)# &#039;&#039;&#039;radius-server host 172.16.0.1 auth-port 1520 key ccna123&lt;br /&gt;
&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User:Kalarsford&amp;diff=1393</id>
		<title>User:Kalarsford</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User:Kalarsford&amp;diff=1393"/>
		<updated>2010-03-05T22:01:53Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: moved User:Kalarsford to Network Access Control&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Network Access Control]]&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Network_Access_Control&amp;diff=1392</id>
		<title>Network Access Control</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Network_Access_Control&amp;diff=1392"/>
		<updated>2010-03-05T22:01:53Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: moved User:Kalarsford to Network Access Control&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NETWORK ACCESS CONTROL&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What is Network Access Control?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	A simple definition of Network Access Control (NAC) can be described as a networking solution that controls, secures, and restricts access to a computer network.  In a nutshell, NACs primary function is to allow you to create a policy that defines what devices can join your network and what resources those devices can access once they are on your network.  However, NAC can provide other services as well such as device discovery, virtual LAN management, provide LAN access to visitors, and switch management.&lt;br /&gt;
&lt;br /&gt;
	NAC provides a way to protect a network from security problems that originate from the &amp;quot;inside&amp;quot;.  This is helpful as network security policies are often focused on preventing attacks from the outside with the use of a firewall and anti-virus software and often leave the door open for easy access to network resources from users on the &amp;quot;inside&amp;quot;.  For example, an outside client or even a visitor to your company may have access to available ports on your network.  The computer the guest connects to a port on your network does not have any firewall or anti-virus software.  So, after he connects to your network, he surfs the internet, picks up a virus and it turn possibly infects your entire network with the virus.  NAC can help prevent this situation from occurring. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What can you do with NAC?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Control Access To Your Network:&#039;&#039;&#039;&lt;br /&gt;
	&lt;br /&gt;
		NAC uses a set of rules to define and implement a policy that describes how to secure access to network ports by devices when they intially attempt to access the network.  For example, when a computer connects to a port on your network, it will not be permitted to access anything on the network unless it meets the requirements of the defined policy.  An example of a requirement that must be met may be that a computer must have anti-virus software installed on it.  If a computer meets all the requirements of the policy, then it will be allowed access to network resources and the internet.  However, just because a computer may meet the requirements of a policy, it doesn&#039;t mean they will have access to all available resources.  NAC can be set up to allow certain computers to have access to only certain things.    NAC can also be set up to only allow certain devices on the network.&lt;br /&gt;
&lt;br /&gt;
		NAC policy is basically set up and defined by a network administrator.  There is no standard policy.  A policy can be created by an administrator to suit the specific needs of their company.&lt;br /&gt;
&lt;br /&gt;
	  &#039;&#039;&#039;Device Discovery&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC can also be used to find out what devices are currently connected to your network.  NAC can be set up to query switches for a list of devices currently connected to the switch ports.  Information about the port, port number, last vlan and last date used can be created and stored.  Reports can be generated from this information gathered.  Also, the devices connected to the ports can be scanned as well, and you can obtain information such as what operating system a certain device is running.  Device discovery can be a useful tool and provide you with an iventory of devices on your network.&lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Virtual LAN Management&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
		VLAN Management can be made easier by using NAC.  For example, if a company re-organizes and decides to move computers to different locations, with a NAC application you wouldn&#039;t need to change the configurations on the switches to reflect the changes in the re-organizing.  You could use the NAC applications GUI and make configuration changes with the simple use of drop-down lists, etc.  Also, if there was ever a need to create a temporary VLAN for the use of a meeting, special project, etc, you could do so using a NAC GUI rather than having to configure and cable switches and PCs.  &lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;LAN Access for Guests/Visitors&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC can also be used to allow access to network resources and the internet to company guests or visitors.  Policies can be created to grant access to certain network resources.  Policies can be created on a per-port basis so depending upon which port the visitor connects to, they will only have access to resources allowed in the policy.  Policies can also be created that will deny all access to any unkown device and also trigger alerts when an unkown device connects to a port.  You could also set up a policy to deny access to any unkown device, except in certain areas such as a meeting room or lobby.  &lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Switch Management&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC application GUIs make it easy to configure your switches even for the most inexperienced users.  And for experienced users, NAC application GUIs can really cut down the time required to configure and manage your switches.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Network_Access_Control&amp;diff=1266</id>
		<title>Network Access Control</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Network_Access_Control&amp;diff=1266"/>
		<updated>2010-03-04T19:24:11Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NETWORK ACCESS CONTROL&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What is Network Access Control?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	A simple definition of Network Access Control (NAC) can be described as a networking solution that controls, secures, and restricts access to a computer network.  In a nutshell, NACs primary function is to allow you to create a policy that defines what devices can join your network and what resources those devices can access once they are on your network.  However, NAC can provide other services as well such as device discovery, virtual LAN management, provide LAN access to visitors, and switch management.&lt;br /&gt;
&lt;br /&gt;
	NAC provides a way to protect a network from security problems that originate from the &amp;quot;inside&amp;quot;.  This is helpful as network security policies are often focused on preventing attacks from the outside with the use of a firewall and anti-virus software and often leave the door open for easy access to network resources from users on the &amp;quot;inside&amp;quot;.  For example, an outside client or even a visitor to your company may have access to available ports on your network.  The computer the guest connects to a port on your network does not have any firewall or anti-virus software.  So, after he connects to your network, he surfs the internet, picks up a virus and it turn possibly infects your entire network with the virus.  NAC can help prevent this situation from occurring. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What can you do with NAC?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Control Access To Your Network:&#039;&#039;&#039;&lt;br /&gt;
	&lt;br /&gt;
		NAC uses a set of rules to define and implement a policy that describes how to secure access to network ports by devices when they intially attempt to access the network.  For example, when a computer connects to a port on your network, it will not be permitted to access anything on the network unless it meets the requirements of the defined policy.  An example of a requirement that must be met may be that a computer must have anti-virus software installed on it.  If a computer meets all the requirements of the policy, then it will be allowed access to network resources and the internet.  However, just because a computer may meet the requirements of a policy, it doesn&#039;t mean they will have access to all available resources.  NAC can be set up to allow certain computers to have access to only certain things.    NAC can also be set up to only allow certain devices on the network.&lt;br /&gt;
&lt;br /&gt;
		NAC policy is basically set up and defined by a network administrator.  There is no standard policy.  A policy can be created by an administrator to suit the specific needs of their company.&lt;br /&gt;
&lt;br /&gt;
	  &#039;&#039;&#039;Device Discovery&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC can also be used to find out what devices are currently connected to your network.  NAC can be set up to query switches for a list of devices currently connected to the switch ports.  Information about the port, port number, last vlan and last date used can be created and stored.  Reports can be generated from this information gathered.  Also, the devices connected to the ports can be scanned as well, and you can obtain information such as what operating system a certain device is running.  Device discovery can be a useful tool and provide you with an iventory of devices on your network.&lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Virtual LAN Management&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
		VLAN Management can be made easier by using NAC.  For example, if a company re-organizes and decides to move computers to different locations, with a NAC application you wouldn&#039;t need to change the configurations on the switches to reflect the changes in the re-organizing.  You could use the NAC applications GUI and make configuration changes with the simple use of drop-down lists, etc.  Also, if there was ever a need to create a temporary VLAN for the use of a meeting, special project, etc, you could do so using a NAC GUI rather than having to configure and cable switches and PCs.  &lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;LAN Access for Guests/Visitors&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC can also be used to allow access to network resources and the internet to company guests or visitors.  Policies can be created to grant access to certain network resources.  Policies can be created on a per-port basis so depending upon which port the visitor connects to, they will only have access to resources allowed in the policy.  Policies can also be created that will deny all access to any unkown device and also trigger alerts when an unkown device connects to a port.  You could also set up a policy to deny access to any unkown device, except in certain areas such as a meeting room or lobby.  &lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Switch Management&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC application GUIs make it easy to configure your switches even for the most inexperienced users.  And for experienced users, NAC application GUIs can really cut down the time required to configure and manage your switches.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Network_Access_Control&amp;diff=1264</id>
		<title>Network Access Control</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Network_Access_Control&amp;diff=1264"/>
		<updated>2010-03-04T18:58:41Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NETWORK ACCESS CONTROL&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What is Network Access Control?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	A simple definition of Network Access Control (NAC) can be described as a networking solution that controls, secures, and restricts access to a computer network.  In a nutshell, NACs primary function is to allow you to create a policy that defines what devices can join your network and what resources those devices can access once they are on your network.  However, NAC can provide other services as well such as device discovery, virtual LAN management, provide LAN access to visitors, and switch management.&lt;br /&gt;
&lt;br /&gt;
	NAC provides a way to protect a network from security problems that originate from the &amp;quot;inside&amp;quot;.  This is helpful as network security policies are often focused on preventing attacks from the outside with the use of a firewall and anti-virus software and often leave the door open for easy access to network resources from users on the &amp;quot;inside&amp;quot;.  For example, an outside client or even a visitor to your company may have access to available ports on your network.  The computer the guest connects to a port on your network does not have any firewall or anti-virus software.  So, when he connects to your network, surfs the internet and picks up a virus that may possibly infect your entire network.  NAC can help prevent this situation from occurring. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What can you do with NAC?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Control Access To Your Network:&#039;&#039;&#039;&lt;br /&gt;
	&lt;br /&gt;
		NAC uses a set of rules to define and implement a policy that describes how to secure access to network ports by devices when they intially attempt to access the network.  For example, when a computer connects to a port on your network, it will not be permitted to access anything on the network unless it meets the requirements of the defined policy.  An example of a requirement that must be met may be that a computer must have anti-virus software installed on it.  If a computer meets all the requirements of the policy, then it will be allowed access to network resources and the internet.  However, just because a computer may meet the requirements of a policy, it doesn&#039;t mean they will have access to all available resources.  NAC can be set up to allow certain computers to have access to only certain things.    NAC can also be set up to only allow certain devices on the network.&lt;br /&gt;
&lt;br /&gt;
		NAC policy is basically set up and defined by a network administrator.  There is no standard policy.  A policy can be created by an administrator to suit the specific needs of their company.&lt;br /&gt;
&lt;br /&gt;
	  &#039;&#039;&#039;Device Discovery&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC can also be used to find out what devices are currently connected to your network.  NAC can be set up to query switches for a list of devices currently connected to the switch ports.  Information about the port, port number, last vlan and last date used can be created and stored.  Reports can be generated from this information gathered.  Also, the devices connected to the ports can be scanned as well, and you can obtain information such as what operating system a certain device is running.  Device discovery can be a useful tool and provide you with an iventory of devices on your network.&lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Virtual LAN Management&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
		VLAN Management can be made easier by using NAC.  For example, if a company re-organizes and decides to move computers to different locations, with a NAC application you wouldn&#039;t need to change the configurations on the switches to reflect the changes in the re-organizing.  You could use the NAC applications GUI and make configuration changes with the simple use of drop-down lists, etc.  Also, if there was ever a need to create a temporary VLAN for the use of a meeting, special project, etc, you could do so using a NAC GUI rather than having to configure and cable switches and PCs.  &lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;LAN Access for Guests/Visitors&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC can also be used to allow access to network resources and the internet to company guests or visitors.  Policies can be created to grant access to certain network resources.  Policies can be created on a per-port basis so depending upon which port the visitor connects to, they will only have access to resources allowed in the policy.  Policies can also be created that will deny all access to any unkown device and also trigger alerts when an unkown device connects to a port.  You could also set up a policy to deny access to any unkown device, except in certain areas such as a meeting room or lobby.  &lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Switch Management&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC application GUIs make it easy to configure your switches even for the most inexperienced users.  And for experienced users, NAC application GUIs can really cut down the time required to configure and manage your switches.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Network_Access_Control&amp;diff=1263</id>
		<title>Network Access Control</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Network_Access_Control&amp;diff=1263"/>
		<updated>2010-03-04T18:58:01Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;NETWORK ACCESS CONTROL&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
What is Network Access Control?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	A simple definition of Network Access Control (NAC) can be described as a networking solution that controls, secures, and restricts access to a computer network.  In a nutshell, NACs primary function is to allow you to create a policy that defines what devices can join your network and what resources those devices can access once they are on your network.  However, NAC can provide other services as well such as device discovery, virtual LAN management, provide LAN access to visitors, and switch management.&lt;br /&gt;
&lt;br /&gt;
	NAC provides a way to protect a network from security problems that originate from the &amp;quot;inside&amp;quot;.  This is helpful as network security policies are often focused on preventing attacks from the outside with the use of a firewall and anti-virus software and often leave the door open for easy access to network resources from users on the &amp;quot;inside&amp;quot;.  For example, an outside client or even a visitor to your company may have access to available ports on your network.  The computer the guest connects to a port on your network does not have any firewall or anti-virus software.  So, when he connects to your network, surfs the internet and picks up a virus that may possibly infect your entire network.  NAC can help prevent this situation from occurring. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What can you do with NAC?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Control Access To Your Network:&#039;&#039;&#039;&lt;br /&gt;
	&lt;br /&gt;
		NAC uses a set of rules to define and implement a policy that describes how to secure access to network ports by devices when they intially attempt to access the network.  For example, when a computer connects to a port on your network, it will not be permitted to access anything on the network unless it meets the requirements of the defined policy.  An example of a requirement that must be met may be that a computer must have anti-virus software installed on it.  If a computer meets all the requirements of the policy, then it will be allowed access to network resources and the internet.  However, just because a computer may meet the requirements of a policy, it doesn&#039;t mean they will have access to all available resources.  NAC can be set up to allow certain computers to have access to only certain things.    NAC can also be set up to only allow certain devices on the network.&lt;br /&gt;
&lt;br /&gt;
		NAC policy is basically set up and defined by a network administrator.  There is no standard policy.  A policy can be created by an administrator to suit the specific needs of their company.&lt;br /&gt;
&lt;br /&gt;
	  &#039;&#039;&#039;Device Discovery&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC can also be used to find out what devices are currently connected to your network.  NAC can be set up to query switches for a list of devices currently connected to the switch ports.  Information about the port, port number, last vlan and last date used can be created and stored.  Reports can be generated from this information gathered.  Also, the devices connected to the ports can be scanned as well, and you can obtain information such as what operating system a certain device is running.  Device discovery can be a useful tool and provide you with an iventory of devices on your network.&lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Virtual LAN Management&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
		VLAN Management can be made easier by using NAC.  For example, if a company re-organizes and decides to move computers to different locations, with a NAC application you wouldn&#039;t need to change the configurations on the switches to reflect the changes in the re-organizing.  You could use the NAC applications GUI and make configuration changes with the simple use of drop-down lists, etc.  Also, if there was ever a need to create a temporary VLAN for the use of a meeting, special project, etc, you could do so using a NAC GUI rather than having to configure and cable switches and PCs.  &lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;LAN Access for Guests/Visitors&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC can also be used to allow access to network resources and the internet to company guests or visitors.  Policies can be created to grant access to certain network resources.  Policies can be created on a per-port basis so depending upon which port the visitor connects to, they will only have access to resources allowed in the policy.  Policies can also be created that will deny all access to any unkown device and also trigger alerts when an unkown device connects to a port.  You could also set up a policy to deny access to any unkown device, except in certain areas such as a meeting room or lobby.  &lt;br /&gt;
&lt;br /&gt;
	&#039;&#039;&#039;Switch Management&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
		NAC application GUIs make it easy to configure your switches even for the most inexperienced users.  And for experienced users, NAC application GUIs can really cut down the time required to configure and manage your switches.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Network_Access_Control&amp;diff=1262</id>
		<title>Network Access Control</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Network_Access_Control&amp;diff=1262"/>
		<updated>2010-03-04T18:56:30Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: Created page with &amp;#039;NETWORK ACCESS CONTROL  What is Network Access Control?  	A simple definition of Network Access Control (NAC) can be described as a networking solution that controls, secures, an…&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NETWORK ACCESS CONTROL&lt;br /&gt;
&lt;br /&gt;
What is Network Access Control?&lt;br /&gt;
&lt;br /&gt;
	A simple definition of Network Access Control (NAC) can be described as a networking solution that controls, secures, and restricts access to a computer network.  In a nutshell, NACs primary function is to allow you to create a policy that defines what devices can join your network and what resources those devices can access once they are on your network.  However, NAC can provide other services as well such as device discovery, virtual LAN management, provide LAN access to visitors, and switch management.&lt;br /&gt;
&lt;br /&gt;
	NAC provides a way to protect a network from security problems that originate from the &amp;quot;inside&amp;quot;.  This is helpful as network security policies are often focused on preventing attacks from the outside with the use of a firewall and anti-virus software and often leave the door open for easy access to network resources from users on the &amp;quot;inside&amp;quot;.  For example, an outside client or even a visitor to your company may have access to available ports on your network.  The computer the guest connects to a port on your network does not have any firewall or anti-virus software.  So, when he connects to your network, surfs the internet and picks up a virus that may possibly infect your entire network.  NAC can help prevent this situation from occurring. &lt;br /&gt;
&lt;br /&gt;
What can you do with NAC?&lt;br /&gt;
&lt;br /&gt;
	Control Access To Your Network:&lt;br /&gt;
	&lt;br /&gt;
		NAC uses a set of rules to define and implement a policy that describes how to secure access to network ports by devices when they intially attempt to access the network.  For example, when a computer connects to a port on your network, it will not be permitted to access anything on the network unless it meets the requirements of the defined policy.  An example of a requirement that must be met may be that a computer must have anti-virus software installed on it.  If a computer meets all the requirements of the policy, then it will be allowed access to network resources and the internet.  However, just because a computer may meet the requirements of a policy, it doesn&#039;t mean they will have access to all available resources.  NAC can be set up to allow certain computers to have access to only certain things.    NAC can also be set up to only allow certain devices on the network.&lt;br /&gt;
&lt;br /&gt;
		NAC policy is basically set up and defined by a network administrator.  There is no standard policy.  A policy can be created by an administrator to suit the specific needs of their company.&lt;br /&gt;
&lt;br /&gt;
	  Device Discovery&lt;br /&gt;
&lt;br /&gt;
		NAC can also be used to find out what devices are currently connected to your network.  NAC can be set up to query switches for a list of devices currently connected to the switch ports.  Information about the port, port number, last vlan and last date used can be created and stored.  Reports can be generated from this information gathered.  Also, the devices connected to the ports can be scanned as well, and you can obtain information such as what operating system a certain device is running.  Device discovery can be a useful tool and provide you with an iventory of devices on your network.&lt;br /&gt;
&lt;br /&gt;
	Virtual LAN Management &lt;br /&gt;
&lt;br /&gt;
		VLAN Management can be made easier by using NAC.  For example, if a company re-organizes and decides to move computers to different locations, with a NAC application you wouldn&#039;t need to change the configurations on the switches to reflect the changes in the re-organizing.  You could use the NAC applications GUI and make configuration changes with the simple use of drop-down lists, etc.  Also, if there was ever a need to create a temporary VLAN for the use of a meeting, special project, etc, you could do so using a NAC GUI rather than having to configure and cable switches and PCs.  &lt;br /&gt;
&lt;br /&gt;
	LAN Access for Guests/Visitors&lt;br /&gt;
&lt;br /&gt;
		NAC can also be used to allow access to network resources and the internet to company guests or visitors.  Policies can be created to grant access to certain network resources.  Policies can be created on a per-port basis so depending upon which port the visitor connects to, they will only have access to resources allowed in the policy.  Policies can also be created that will deny all access to any unkown device and also trigger alerts when an unkown device connects to a port.  You could also set up a policy to deny access to any unkown device, except in certain areas such as a meeting room or lobby.  &lt;br /&gt;
&lt;br /&gt;
	Switch Management&lt;br /&gt;
&lt;br /&gt;
		NAC application GUIs make it easy to configure your switches even for the most inexperienced users.  And for experienced users, NAC application GUIs can really cut down the time required to configure and manage your switches.&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=727</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=727"/>
		<updated>2009-12-16T02:32:00Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm5.JPG]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm3.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm2.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot;.  You can also click the green arrow in the toolbar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm6.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm4.JPG]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Windows XP setup wizard will appear.  Follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make sure under the &amp;quot;network connections&amp;quot; for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=726</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=726"/>
		<updated>2009-12-16T02:25:21Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm5.JPG]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm3.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm2.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm6.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm4.JPG]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Windows XP setup wizard will appear.  Follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make sure under the &amp;quot;network connections&amp;quot; for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm6.JPG&amp;diff=725</id>
		<title>File:Vm6.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm6.JPG&amp;diff=725"/>
		<updated>2009-12-16T02:24:32Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: uploaded a new version of &amp;quot;File:Vm6.JPG&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm6.JPG&amp;diff=724</id>
		<title>File:Vm6.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm6.JPG&amp;diff=724"/>
		<updated>2009-12-16T02:20:36Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=723</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=723"/>
		<updated>2009-12-16T02:18:42Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm5.JPG]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm3.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm2.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm4.JPG]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Windows XP setup wizard will appear.  Follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make sure under the &amp;quot;network connections&amp;quot; for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm5.JPG&amp;diff=722</id>
		<title>File:Vm5.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm5.JPG&amp;diff=722"/>
		<updated>2009-12-16T02:18:05Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=721</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=721"/>
		<updated>2009-12-16T02:13:27Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm3.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm2.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm4.JPG]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Windows XP setup wizard will appear.  Follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make sure under the &amp;quot;network connections&amp;quot; for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=720</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=720"/>
		<updated>2009-12-16T02:06:41Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm3.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm2.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm4.JPG]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make sure under the &amp;quot;network connections&amp;quot; for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=719</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=719"/>
		<updated>2009-12-16T02:06:16Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete.&lt;br /&gt;
[[File:Vm3.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm2.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm4.JPG]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make sure under the &amp;quot;network connections&amp;quot; for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=718</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=718"/>
		<updated>2009-12-16T02:05:19Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete.&lt;br /&gt;
[[File:Vm3.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Vm2.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Vm4.JPG]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make sure under the &amp;quot;network connections&amp;quot; for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=717</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=717"/>
		<updated>2009-12-16T02:04:17Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete.&lt;br /&gt;
[[File:Vm3.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Vm2.JPG]]&lt;br /&gt;
&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[[File:Vm4.JPG]] &lt;br /&gt;
&lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make sure under the &amp;quot;network connections&amp;quot; for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm4.JPG&amp;diff=716</id>
		<title>File:Vm4.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm4.JPG&amp;diff=716"/>
		<updated>2009-12-16T02:02:51Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=715</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=715"/>
		<updated>2009-12-16T01:58:58Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete.&lt;br /&gt;
[[File:Vm3.JPG]]&lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
[[File:Vm2.JPG]]&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make sure under the &amp;quot;network connections&amp;quot; for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm3.JPG&amp;diff=714</id>
		<title>File:Vm3.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm3.JPG&amp;diff=714"/>
		<updated>2009-12-16T01:58:01Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: uploaded a new version of &amp;quot;File:Vm3.JPG&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm3.JPG&amp;diff=713</id>
		<title>File:Vm3.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm3.JPG&amp;diff=713"/>
		<updated>2009-12-16T01:56:30Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=712</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=712"/>
		<updated>2009-12-16T01:50:30Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete. &lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
[[File:Vm2.JPG]]&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make under the network connections for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm2.JPG&amp;diff=711</id>
		<title>File:Vm2.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm2.JPG&amp;diff=711"/>
		<updated>2009-12-16T01:49:42Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=710</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=710"/>
		<updated>2009-12-16T01:47:49Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete. &lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot;&lt;br /&gt;
[[File:Vm1.JPG]]&lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make under the network connections for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm1.JPG&amp;diff=709</id>
		<title>File:Vm1.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Vm1.JPG&amp;diff=709"/>
		<updated>2009-12-16T01:46:31Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=708</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=708"/>
		<updated>2009-12-16T01:44:08Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete. &lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot; &lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make under the network connections for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=707</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=707"/>
		<updated>2009-12-16T01:40:52Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete. &lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot; &lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
[[File:Icopiedit.jpg]]&lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make under the network connections for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=706</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=706"/>
		<updated>2009-12-16T01:40:32Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete. &lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot; &lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
[[File:Icpoiedit.jpg]]&lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make under the network connections for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Icopiedit.JPG&amp;diff=705</id>
		<title>File:Icopiedit.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Icopiedit.JPG&amp;diff=705"/>
		<updated>2009-12-16T01:39:41Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=704</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=704"/>
		<updated>2009-12-16T01:38:24Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete. &lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot; &lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make under the network connections for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=697</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=697"/>
		<updated>2009-12-10T20:03:13Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete. &lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot; &lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
[[File:bridged.jpg]]&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make under the network connections for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Bridged.jpg&amp;diff=696</id>
		<title>File:Bridged.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Bridged.jpg&amp;diff=696"/>
		<updated>2009-12-10T19:56:36Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Bridged.JPG&amp;diff=695</id>
		<title>File:Bridged.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Bridged.JPG&amp;diff=695"/>
		<updated>2009-12-10T19:55:23Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=694</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=694"/>
		<updated>2009-12-10T19:53:33Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete. &lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot; &lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make under the network connections for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=685</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=685"/>
		<updated>2009-12-09T16:11:59Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete. &lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot; &lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot;&lt;br /&gt;
*Under the &amp;quot;Device&amp;quot; tab make sure the &amp;quot;network adapter&amp;quot; is set to &amp;quot;bridged&amp;quot;&lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Make under the network connections for the PC you are using, the wireless connection is disabled.  Otherwise, VMWare may not run properly. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=683</id>
		<title>VMWare Setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=VMWare_Setup&amp;diff=683"/>
		<updated>2009-12-09T16:09:07Z</updated>

		<summary type="html">&lt;p&gt;Kalarsford: Created page with &amp;#039;= &amp;#039;&amp;#039;&amp;#039;VMware Setup Instructions&amp;#039;&amp;#039;&amp;#039;  =  &amp;#039;&amp;#039;&amp;#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&amp;#039;&amp;#039;&amp;#039;   *Click My Computer  *Click on C: drive  *Click on VMWare  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Step 2:&amp;amp;nbsp; Make a cop…&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;VMware Setup Instructions&#039;&#039;&#039;  =&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 1:&amp;amp;nbsp; Locate VMware folder in C:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click My Computer &lt;br /&gt;
*Click on C: drive &lt;br /&gt;
*Click on VMWare&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 2:&amp;amp;nbsp; Make a copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder and select copy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 3:&amp;amp;nbsp; Paste your copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Right click on an open area in the VMWare folder and select paste.&amp;amp;nbsp; Process will take 10-15 minutes to complete. &lt;br /&gt;
*Rename folder &lt;br /&gt;
*Only the user who created this folder will be able to use it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 4:&amp;amp;nbsp; Open VMWare Workstation&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click Start / All Programs / VMWare &lt;br /&gt;
*Click VMWare Workstation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Step 5:&amp;amp;nbsp; Open&amp;amp;nbsp;Existing VM or Team&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
*Click on &amp;quot;Open Existing VM or Team&amp;quot; &lt;br /&gt;
*Open the folder that you created in Step 3 &lt;br /&gt;
*Double Click on &amp;quot;Windows XP SP3.vmx&amp;quot; &lt;br /&gt;
*Under &amp;quot;Commands&amp;quot; click on &amp;quot;Power on this Virtual Machine&amp;quot; (next to the green arrow). &lt;br /&gt;
*Prompt will ask you if you &amp;quot;moved&amp;quot; or &amp;quot;copied&amp;quot;&amp;amp;nbsp;the virtual machine.&amp;amp;nbsp; Select &amp;quot;I copied it&amp;quot;. &lt;br /&gt;
*Windows XP setup wizard will appear and follow steps to complete setup.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Process must be done on each computer that you log in on to be able to run VMWare.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*To run multiple VMWare workstations on same computer, make an extra copy of the &amp;quot;B143 B144 VM 3-13-09&amp;quot; folder.&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kalarsford</name></author>
	</entry>
</feed>