- Setting up a wireless network
- Get the right equipment
- Setting up the modem and Internet connection
- Positioning the wireless router
- Securing your wireless network
- Connect a PC to your wireless network
- Setting Up KDNET Network Kernel Debugging Manually
- Supported Network Adapters
- Install the Debugging Tools for Windows
- Determining the IP Address of the Host Computer
- Choosing a Port for Network Debugging
- Setting Up the Target Computer
- Starting the Debugging Session
- Using KD
- Restarting the Target PC
- Allowing the debugger through the firewall
- Encryption key
- Troubleshooting Tips
- Debugging application must be allowed through firewall
- Port number must be in range allowed by network policy
- Use Ping to test connectivity
- How the Debugger Obtains an IP Address for the Target Computer
- Always specify busparams when setting up KDNET on a physical machine with a PCI based NIC
- Manually delete BCDEdit entries
- Hyper-V
- Setting up Hyper-V
- Enabling KDNET on a hyper-v host that is running VMs with external network connectivity
Setting up a wireless network
A wireless network at home lets you get online from more places in your house. This article describes the basic steps for setting up a wireless network and starting to use it.
Get the right equipment
Before you can set up your wireless network, here’s what you’ll need:
Broadband Internet connection and modem. A broadband Internet connection is a high-speed Internet connection. Digital Subscriber Line (DSL) and cable are two of the most common broadband connections. You can get a broadband connection by contacting an Internet service provider (ISP). Typically, ISPs that provide DSL are telephone companies and ISPs that provide cable are cable TV companies. ISPs frequently offer broadband modems. Some ISPs also offer combination modem/wireless routers. You can also find these at computer or electronics stores, and online.
Wireless router. A router sends info between your network and the Internet. With a wireless router, you can connect PCs to your network using radio signals instead of wires. There are several different kinds of wireless network technologies, which include 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.
Wireless network adapter. A wireless network adapter is a device that connects your PC to a wireless network. To connect your portable or desktop PC to your wireless network, the PC must have a wireless network adapter. Most laptops and tablets—and some desktop PCs—come with a wireless network adapter already installed.
To check whether your PC has a wireless network adapter:
Select the Start button, type device manager in the search box, and then select Device Manager.
Expand Network adapters.
Look for a network adapter that might have wireless in the name.
Setting up the modem and Internet connection
After you have all the equipment, you’ll need to set up your modem and Internet connection. If your modem wasn’t set up for you by your Internet service provider (ISP), follow the instructions that came with your modem to connect it to your PC and the Internet. If you’re using Digital Subscriber Line (DSL), connect your modem to a phone jack. If you’re using cable, connect your modem to a cable jack.
Positioning the wireless router
Put your wireless router somewhere where it will receive the strongest signal with the least amount of interference. For better results, follow these tips:
Place your wireless router in a central location. Place the router as close to the center of your home as possible to increase the strength of the wireless signal throughout your home.
Position the wireless router off the floor and away from walls and metal objects, such as metal file cabinets. The fewer physical obstructions between your PC and the router’s signal, the more likely that you’ll be using the router’s full signal strength.
Reduce interference. Some networking equipment uses a 2.4 gigahertz (GHz) radio frequency. This is the same frequency as most microwaves and many cordless phones. If you turn on the microwave or get a call on a cordless phone, your wireless signal might be temporarily interrupted. You can avoid most of these issues by using a cordless phone with a higher frequency, such as 5.8 GHz.
Securing your wireless network
Security is always important; with a wireless network, it’s even more important because your network’s signal could be broadcast outside your home. If you don’t help secure your network, people with PCs nearby could access info stored on your network PCs and use your Internet connection.
To help make your network more secure:
Change the default user name and password. This helps protect your router. Most router manufacturers have a default user name and password on the router and a default network name (also known as the SSID). Someone could use this info to access your router without you knowing it. To help avoid that, change the default user name and password for your router. See the documentation for your device for instructions.
Set up a security key (password) for your network. Wireless networks have a network security key to help protect them from unauthorized access. We recommend using Wi-Fi Protected Access 2 (WPA2) security if your router supports it. See the documentation for your router for more detailed info, including what type of security is supported and how to set it up.
Some routers support Wi-Fi Protected Setup (WPS). If your router supports WPS and it’s connected to the network, follow these steps to set up a network security key:
Do one of the following, depending on which version of Windows is running on your PC:
In Windows 7 or Windows 8.1, select Start, start typing Network and Sharing Center, and then choose it in the list.
In Windows 10, select Start , then select Settings > Network & Internet > Status > Network and Sharing Center.
Select Set up a new connection or network.
Select Set up a new network, then choose Next.
The wizard will walk you through creating a network name and a security key. If your router supports it, the wizard will default to Wi‑Fi Protected Access (WPA or WPA2) security. We recommend that you use WPA2, because it offers better security than WPA or Wired Equivalent Privacy (WEP) security. With WPA2 or WPA you can also use a passphrase, so you don’t have to remember a cryptic sequence of letters and numbers.
Write down your security key and keep it in a safe place. You can also save your security key on a USB flash drive by following the instructions in the wizard. (Saving your security key to a USB flash drive is available in Windows 8 and Windows 7, but not in Windows 10.)
Use a firewall. A firewall is hardware or software that can help protect your PC from unauthorized users or malicious software (malware). Running a firewall on each PC on your network can help control the spread of malicious software on your network, and help protect your PCs when you’re accessing the Internet. Windows Firewall is included with this version of Windows.
Connect a PC to your wireless network
Select the Network or icon in the notification area.
In the list of networks, choose the network that you want to connect to, and then select Connect.
Type the security key (often called the password).
Follow additional instructions if there are any.
If you have problems with your Wi-Fi network when using Windows 10, see Fix Wi-Fi problems in Windows 10 for advanced troubleshooting info.
Setting Up KDNET Network Kernel Debugging Manually
Debugging Tools for Windows supports kernel debugging over a network. This topic describes how to set up network debugging manually.
Setting up a network debugging manually is a complex and error prone process. To set up network debugging automatically, see Setting Up KDNET Network Kernel Debugging Automatically. Using the KDNET utility is strongly recommended for all debugger users.
The computer that runs the debugger is called the host computer, and the computer being debugged is called the target computer. The host computer must be running Windows 7 or later, and the target computer must be running WindowsВ 8 or later.
Debugging over a network has the following advantages compared to debugging over other types of connectivity.
- The host and target computers can be anywhere on the local network.
- It is easy to debug many target computers from one host computer.
- Given any two computers, it is likely that they will both have Ethernet adapters. It is less likely that they will both have serial ports or both have 1394 ports.
- Network debugging is significantly faster than serial port debugging.
Supported Network Adapters
The host computer can use any network adapter, but the target computer must use a network adapter that is supported by Debugging Tools for Windows. For a list of supported network adapters, see Supported Ethernet NICs for Network Kernel Debugging in WindowsВ 10 and Supported Ethernet NICs for Network Kernel Debugging in WindowsВ 8.1.
Install the Debugging Tools for Windows
Confirm that the Debugging Tools for Windows are installed on the host system. For information on downloading and installing the debugger tools, see Download Debugging Tools for Windows.
Determining the IP Address of the Host Computer
Use one of the following procedures to determine the IP address of the host computer.
On the host computer, open a Command Prompt window and enter the following command:
Make a note of the IPv4 address of the network adapter that you intend to use for debugging.
On the target computer, open a Command Prompt window and enter the following command, where YourIPAddress is the IP address of the host computer:
Choosing a Port for Network Debugging
Choose a port number that will be used for debugging on both the host and target computers. You can choose any number from 49152 through 65535, the recommended range is 50000 — 50039. The port that you choose will be opened for exclusive access by the debugger running on the host computer. Take care to choose a port number that is not used by any other applications that run on the host computer.
NoteВ В The range of port numbers that can be used for network debugging might be limited by your company’s network policy. There is no way to tell from the host computer what the limitations are. To determine whether your company’s policy limits the range of ports that can be used for network debugging, check with your network administrators.
If you connect several target computers to a single host computer, each connection must have a unique port number. For example, if you connect 100 target computers to a single host computer, you can assign port 50000 to the first connection, port 50001 to the second connection, port 50002 to the third connection, and so on.
NoteВ В A different host computer could use the same range of ports (50000 through 50099) to connect to another 100 target computers.
Setting Up the Target Computer
Verify that the target computer has a supported network adapter. See these topics for more information.
Connect the supported adapter to a network hub or switch using an appropriate network cable.
Before using BCDEdit to change boot information you may need to temporarily suspend Windows security features such as BitLocker and Secure Boot on the test PC. Re-enable these security features when testing is complete and appropriately manage the test PC, when the security features are disabled.
In an elevated Command Prompt window, enter the following commands, where w.x.y.z is the IP address of the host computer, and n is a port number of your choice:
bcdedit will display an automatically generated key. Copy the key and store it on a removable storage device like a USB flash drive. You will need the key when you start a debugging session on the host computer.
NoteВ В We strongly recommend that you use an automatically generated key. However, you can create your own key as described later in the «Creating Your Own Key» section.
Use Device Manager to determine the PCI bus, device, and function numbers for the adapter you want to use for debugging. These values are displayed in Device Manager under Location on the General tab. Then in an elevated Command Prompt window, enter the following command, where b, d, and f are the bus number, device number, and function number of the adapter:
The target PC will be rebooted after a kernel debugger is attached. This is described in the next section.
NoteВ В If you intend to install the Hyper-V role on the target computer, see Setting Up Network Debugging of a Virtual Machine Host.
CautionВ В If your target computer is in a docking station, and you have network debugging enabled for a network adapter that is part of the docking station, do not remove the computer from the docking station. If you need to remove the target computer from the docking station, disable kernel debugging first. To disable kernel debugging on the target computer, open a Command Prompt window as Administrator and enter the command bcdedit /debug off. Reboot the target computer.
Starting the Debugging Session
Confirm that the network adapter of the host computer to a network hub or switch using an appropriate network cable.
On the host computer, open WinDbg. On the File menu, choose Kernel Debug. In the Kernel Debugging dialog box, open the Net tab. Enter your port number and key. Select OK.
You can also start a session with WinDbg by opening a Command Prompt window and entering the following command, where n is your port number and MyKey is the key that was automatically generated by bcdedit when you set up the target computer:
If you are prompted about allowing WinDbg to access the port through the firewall, allow WinDbg to access the port for all three of the different network types.
Using KD
On the host computer, open a Command Prompt window. Enter the following command, where n is your port number and MyKey is the key that was automatically generated by bcdedit when you set up the target computer:
If you are prompted about allowing WinDbg to access the port through the firewall, allow WinDbg to access the port for all three of the different network types.
Restarting the Target PC
Once the debugger is connected, and waiting to connect, reboot the target computer. One way to do restart the PC is to use this command, from an administrator’s command prompt.
When the target is restarted, the debugger in the host OS should connect.
After connecting to the target on the host, hit break on your debugger and you can start debugging.
Allowing the debugger through the firewall
When you first attempt to establish a network debugging connection, you might be prompted to allow the debugging application (WinDbg or KD) access through the firewall. Client versions of Windows display the prompt, but Server versions of Windows do not display the prompt. You should respond to the prompt by checking the boxes for all three network types: domain, private, and public. If you do not get the prompt, or if you did not check the boxes when the prompt was available, you must use Control Panel to allow access through the firewall. Open Control Panel > System and Security and select Allow an app through Windows Firewall. In the list of applications, locate Windows GUI Symbolic Debugger and Windows Kernel Debugger. Use the check boxes to allow those two applications through the firewall. Restart your debugging application (WinDbg or KD).
Encryption key
To keep the target computer secure, packets that travel between the host and target computers must be encrypted. We strongly recommend that you use an automatically generated encryption key (provided by bcdedit when you configure the target computer). Network debugging uses a 256-bit key that is specified as four 64-bit values, in base 36, separated by periods. Each 64-bit value is specified by using up to 13 characters. Valid characters are the letters a through z and the digits 0 through 9. Special characters are not allowed.
To specify your own key, open an elevated Command Prompt window on the target computer. Enter the following command, where w.x.y.z is the IP address of the host computer, and n is your port number, and Key is your key:
The target computer needs to be rebooted anytime the dbgsettings are changed.
Troubleshooting Tips
Debugging application must be allowed through firewall
When you first attempt to establish a network debugging connection, you might be prompted to allow the debugging application (WinDbg or KD) access through the firewall. Client versions of Windows display the prompt, but Server versions of Windows do not display the prompt. You should respond to the prompt by checking the boxes for all three network types: domain, private, and public. If you do not get the prompt, or if you did not check the boxes when the prompt was available, you must use Control Panel to allow access through the firewall. Open Control Panel > System and Security and select Allow an app through Windows Firewall. In the list of applications, locate Windows GUI Symbolic Debugger and Windows Kernel Debugger. Use the check boxes to allow those two applications through the firewall. Scroll down and select OK, to save the firewall changes. Restart the debugger.
Port number must be in range allowed by network policy
The range of port numbers that can be used for network debugging might be limited by your company’s network policy. To determine whether your company’s policy limits the range of ports that can be used for network debugging, check with your network administrator. On the target computer, open a Command Prompt window as Administrator and enter the command bcdedit /dbgsettings. The output will be similar to this.
In the preceding output, the value of port is 50085. If the value of port lies outside the range allowed by your network administrator, enter the following command, where w.x.y.z is the IP address of the host computer, and YourDebugPort is a port number in the allowed range.
After changing the target machine debugger settings, rerun the debugger on the host machine with the new port setting, and then reboot the target computer.
Use Ping to test connectivity
If the debugger does not connect use the ping command on the target PC to verify connectivity.
Note that this may not work if your host computer is not configured to be discoverable on the network, since the firewall may block ping requests, and because of this, you will not get any responses when you ping the host.
How the Debugger Obtains an IP Address for the Target Computer
KDNET on the target computer attempts to use Dynamic Host Configuration Protocol (DHCP) to get a routable IP address for the network adapter that is being used for debugging. If KDNET obtains a DHCP-assigned address, then the target computer can be debugged by host computers located anywhere on the network. If KDNET fails to obtain a DHCP-assigned address, it uses Automatic Private IP Addressing (APIPA) to obtain a local link IP address. Local link IP addresses are not routable, so a host and target cannot use a local link IP address to communicate through a router. In that case, network debugging will work if you plug the host and target computers into the same network hub or switch.
Always specify busparams when setting up KDNET on a physical machine with a PCI based NIC
If you are setting up KDNET on a physical machine with a PCI or PCIe based NIC, you should always specify the busparams for the NIC you want to use for KDNET. To specify the bus parameters, Open Device Manager, and locate the network adapter that you want to use for debugging. Open the property page for the network adapter and make a note of the bus number, device number, and function number that are displayed under Location on the General tab. In an elevated Command Prompt Window, enter the following command, where b, d, and f are the bus, device and function numbers in decimal format:
When the debugger is running on the host machine, and waiting to connect, reboot the target computer, using this command.
Manually delete BCDEdit entries
Manually deleting is not normally required but is provided here as a troubleshooting procedure for unusual situations.
Manually deleting entries is not necessary when using the kdnet utility. For more information, see Setting Up KDNET Network Kernel Debugging Automatically.
When you use bcdedit –deletevalue, you must provide a valid bcd element name. For more information, see BCDEdit /deletevalue.
To manually delete BCDEdit entries, complete these steps.
On the target computer, open a Command Prompt window as Administrator.
As an example, enter this command to delete the BCDEdit debugging entry for the host IP address.
When you delete the hostip, you need to specify target= on the debugger command line.
As another example, delete the port entry using this command.
When you delete the port entry, KDNET will use the default ICANN registered debugger port of 5364.
Hyper-V
Setting up Hyper-V
If you intend to install the Hyper-V role on the target computer, see Setting Up Network Debugging of a Virtual Machine Host.
For information on debugging a hyper-v Virtual Machine (VM), see Setting Up Network Debugging of a Virtual Machine — KDNET.
Enabling KDNET on a hyper-v host that is running VMs with external network connectivity
There is a specific situation, which is not uncommon, which will cause networking in VMs to stop working:
Hyper-V has been enabled on the PC, an external networking switch has been created and is pointed at a physical NIC in the machine, and VMs have been configured to use that external switch for their networking.
KDNET is then enabled on the hyper-v host OS using the same physical NIC that is pointed to by the external networking switch, and the host is rebooted.
All of the VMs that were using the previously configured external switch, lose their network connectivity after the reboot.
This is by design, and happens because KDNET takes exclusive control over the NIC it is configured to use, and the native NDIS miniport for that NIC is not loaded by the OS. When this occurs, the external networking switch can no longer communicate with the native NDIS miniport driver, and will stop working. To work around this situation, do the following:
Open the Virtual Switch Manager from Hyper-V Manager, select your existing Virtual Switch, and change the external network NIC to the Microsoft Kernel Debug Network Adapter by selecting it from the drop down box and then selecting OK in the Virtual Switch Manager dialog box.
After updating your Virtual Switch NIC, shutdown and restart your VMs.
When KDNET debugging is turned off, the same procedure will need to be followed to repoint the external switch back to the native NDIS miniport for the NIC. Otherwise VM connectivity will be lost when the machine is rebooted after debugging is disabled.
IPv6 support was added in Windows version 1809.
To use IPv6 with the debugger complete these steps.
Ping your and note the IPv6 address that is reported on the Reply from output lines.Use this IPv6 address in place of x:y:z:p:d:q:r:n below.
Use BCDEdit to delete any existing ip address values in dbgsettings.
Set the IPv6 address of the host. There must not be any spaces in the hostipv6=s:t:u:v:w:x:y:z string. is is the network port number to use for this target machine, is the four part security key, and are the bus device function location numbers for the NIC you want to use for KDNET.
Type this command to confirm that the dbgsettings are set properly.
On the host machine use this command to start the debugger.
When the debugger is running on the host machine, and waiting to connect, reboot the target computer.
The debugger should connect to the host debugger early during boot. You will know that KDNET is using an IPv6 connection because the IP addresses reported in the connected message will be IPv6 addresses instead of IPv4 addresses.
NOTES
Every debugger bcd setting that allows the hostip to be specified has a corresponding hostipv6 element. There are three.
IPv4 | IPv6 | Usage |
---|---|---|
hostip | hostipv6 | For boot and kernel debugging |
targethostip | targethostipv6 | Specific to kernel debugging |
hypervisorhostip | hypervisorhostipv6 | For hyper-v debugging |
If you set the hostipv6 style address for any of those kinds of debugging, it means you want and will get IPv6.
If you set the hostip style address for any of those kinds of debugging, it means you want and will get IPv4.
The target will only do IPv4 or IPv6, not both at the same time. Which version of the IP protocol is used is controlled by the target machine dbgsettings. If hostip is set, the target will use IPv4. If hostipv6 is set, the target will use IPv6.
The host debugger will normally auto select use of IPv4 or IPv6. By default the debugger listens on both an IPv4 socket and an IPv6 socket, and connects automatically on either one to the target machine.
If you want to force use of IPv6 in the debugger on the host, but you want the debugger to listen for a connection from the target, then you can add, target=:: to the debugger command line. :: is an IPv6 address of 0.
If you want to force IPv4 debugging in the debugger on the host, but you want the debugger to listen for a connection from the target, then you can add, target=0.0.0.0 to the debugger command line. 0.0.0.0 is an IPv4 address of 0.
If you specify, target= on the debugger command line and use a machine name, the debugger will convert that machine name into an IPv4 address and an IPv6 address, and will attempt to connect on both.
If you specify, target= on the debugger command line, and use an IP address, if the IP address contains any contains any : characters, the debugger will assume it is an IPv6 address, and will force use of IPv6 for that connection. If the IP address contains any . characters, the debugger will assume it is an IPv4 address, and will force use of IPv4 for that connection.
If you setup IPv6 on the target, and force use of IPv4 on the debugger command line, you will not get a connection.
If you setup IPv4 on the target, and force use of IPv6 on the debugger command line, you will also not get a connection.