What we did today

We started class today by testing a networking tool called Nmap – a network scanner. However, it should be used with caution and must only be tested within ones’ own network because it is an intrusive tool which must not be used haphazardly especially in the public space. So we downloaded the Nmap program and installed it via the site. Using the command prompt and navigating to the folder c:\ Program Files (x86)\Nmap we entered nmap -sP 10.61.0.0/16. Nmap then pings the full range of IPs in the 10.61.0.0 network.

The output was interesting. It showed the devices that replied, their IP address, MAC address and the manufacturer information. Using a web browser I tried the IP address 10.61.0.99 which opened up the console for one of the IP cameras at CTP.

Afterwards, we finished the IP phone provisioning assignment.