Bag-O-Bytes October 6 th, 2004 Home Networking Presented by The FPB Help Desk x6322.

Slides:



Advertisements
Similar presentations
AARP Tax-Aide Sonoma/Napa District Bill Dornbush, TC Guide to Printer Sharing.
Advertisements

Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Rana Radwan LTEC 4550 Configuring a laptop to access a Wireless Access Point.
Installing a Wireless Home Network
CY-SWR1100 Dual Band Wireless N Router
How To Set Up A Wireless Network Using A D-Link Wireless Router
DSL-2730B, DSL-2740B, DSL-2750B.
DAP-1520 FAQ’s Wireless AC750 Dual Band Range Extender.
DSL-2870B How to Change ADSL Username and Password in your modem router How to Change Wireless Channel in your modem router How to Open Ports in your modem.
Windows XP Home Networking. 2 Windows XP The dominant client operating system from Microsoft today Strong security features make it a wise upgrade for.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Wi-Fi Structures.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Introduction to Computer Networking. Wireless Network.
Configuring your Home Wireless Network Configuring your Home Wireless Network Adapted from Presentation at APCUG By Jay Ferron ADMT, CISM, CISSP, MCDBA,
Designing a Home Network By Tabby Booth. Network Components Motorola Cable Modem Wireless 4 port Linksys Router Compaq Desktop Computer – NIC card HP.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
BY: Jordan Ameerali. What is an Internet Service Provider? A Internet Service Provider or ISP is a company that provides access to the Internet. For a.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
File sharing. Connect the two win 7 systems with LAN card Open the network.
TEW-691GR Training TEW-691GR Training TEW-691GR 450Mbps Wireless N Gigabit Router.
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Technical Training: DIR-615
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
Wireless Networking 102.
DWR-113 FAQ’s 3G WiFi Router.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Linksys LNKWET11 Setup b Ethernet Converter Step 1. Annotate your Computer’s ethernet IP address. Step 2. Change the Ethernet IP Address/subnet/router.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Home Networking. Objectives Understand the basics Network Addressing Learn the basic hardware needed to form a home network Learn basic Firewall functionality.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Configuring Windows XP-Based Laptops for Guest Access to Bloomsburg University’s Wireless Network Intended for University staff, and guests planning to.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Steps To Set Up Your Home Wireless Network You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Computer Concepts 2014 Chapter 5 Local Area Networks.
DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Chapter 12 Troubleshooting Internet Connectivity Prepared by: Khurram N. Shamsi.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Securing A Wireless Home Network. Simple home wired LAN.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
How to Use LINCWorks as a Wireless Repeater For additional help please contact: Paul Peterson
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Instructor Materials Chapter 6 Building a Home Network
How To Set Up A Wireless Network
CS101 Home Network Basics.
Principles of Information Technology
Presentation transcript:

Bag-O-Bytes October 6 th, 2004 Home Networking Presented by The FPB Help Desk x6322

Please Save All Questions Until the End of the Presentation

For use with DSL/Cable connections For use with DSL/Cable connections Not for Dial in Not for Dial in Connects a variety of computers Connects a variety of computers Wired and wirelessly Wired and wirelessly

Key component: Key component: A ROUTER! A ROUTER!

Example: Wireless-G Broadband Router Example: Wireless-G Broadband Router All-in-one Internet-sharing Router, 4-port Switch, and Wireless-G (802.11g) Access Point All-in-one Internet-sharing Router, 4-port Switch, and Wireless-G (802.11g) Access Point Shares a single Internet connection and other resources with Ethernet wired and Wireless-G clients Shares a single Internet connection and other resources with Ethernet wired and Wireless-G clients Wireless data rates up to 54Mbps -- 5 times as fast as Wireless-B (802.11b), but also interoperable with Wireless-B devices (at 11Mbps) Wireless data rates up to 54Mbps -- 5 times as fast as Wireless-B (802.11b), but also interoperable with Wireless-B devices (at 11Mbps) Advanced security: Wi-Fi Protected Access™ (WPA), wireless MAC address filtering, powerful SPI firewall Advanced security: Wi-Fi Protected Access™ (WPA), wireless MAC address filtering, powerful SPI firewall

More: The Linksys Wireless-G Broadband Router is really three devices in one box. More: The Linksys Wireless-G Broadband Router is really three devices in one box. First, there's the Wireless Access Point, which lets you connect Wireless-G or Wireless-B devices to the network. First, there's the Wireless Access Point, which lets you connect Wireless-G or Wireless-B devices to the network.

There's also a built-in 4-port full- duplex 10/100 Switch to connect your wired-Ethernet devices. Connect four PCs directly, or daisy-chain out to more hubs and switches to create as big a network as you need. There's also a built-in 4-port full- duplex 10/100 Switch to connect your wired-Ethernet devices. Connect four PCs directly, or daisy-chain out to more hubs and switches to create as big a network as you need.

Finally, the Router function ties it all together and lets your whole network share a high-speed cable or DSL Internet connection, files, and other resources such as printers and hard disk storage space. Finally, the Router function ties it all together and lets your whole network share a high-speed cable or DSL Internet connection, files, and other resources such as printers and hard disk storage space.

How are you protected with your new wireless router? How are you protected with your new wireless router? Linksys: To protect your data and privacy, the Wireless-G Broadband Router can encode all wireless transmissions using 128-bit WEP encryption. Linksys: To protect your data and privacy, the Wireless-G Broadband Router can encode all wireless transmissions using 128-bit WEP encryption.

Hackers!!! Hackers!!! One result of this, seen in many large cities and business districts, is called “Warchalking”. This is one of the terms used for hackers looking to access free bandwidth and free Internet access through your wireless network. One result of this, seen in many large cities and business districts, is called “Warchalking”. This is one of the terms used for hackers looking to access free bandwidth and free Internet access through your wireless network.

Some steps to take: Some steps to take: Change the router’s administrator password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly. Change the router’s administrator password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

More steps: More steps: SSID. There are several things to keep in mind about the SSID: SSID. There are several things to keep in mind about the SSID: Disable Broadcast Disable Broadcast Make it unique Make it unique Change it often Change it often

Some additional info on SSID: Some additional info on SSID: Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID. Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have start from the beginning in trying to break in. Change your SSID regularly so that any hackers who have gained access to your wireless network will have start from the beginning in trying to break in.

MAC Addresses: MAC Addresses: A unique hex character address on every network/modem/wifi card A unique hex character address on every network/modem/wifi card Ex: ac-d6-ed-f2 Ex: ac-d6-ed-f2 How to find: How to find: Go to start/run and type: cmd (hit enter) Go to start/run and type: cmd (hit enter) Type: ipconfig /all (hit enter) Type: ipconfig /all (hit enter)

MAC cont: MAC cont: MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address. MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP security: WEP security: WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult. WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult. If you are transmitting sensitive data over your network, encryption should be used. If you are transmitting sensitive data over your network, encryption should be used.

WEP cont: WEP cont: There are several ways that WEP can be maximized: There are several ways that WEP can be maximized: Use the highest level of encryption possible Use the highest level of encryption possible Use a “Shared” Key Use a “Shared” Key Use multiple WEP keys Use multiple WEP keys Change your WEP key regularly Change your WEP key regularly

So, overall, here are some tips! Change the default SSID. Change the default SSID. Disable SSID Broadcasts. Disable SSID Broadcasts. Change the default password for the Administrator account. Change the default password for the Administrator account. Enable MAC Address Filtering. Enable MAC Address Filtering. Change the SSID periodically. Change the SSID periodically. Enable WEP 128-bit Encryption. Please note that this will reduce your network performance. Enable WEP 128-bit Encryption. Please note that this will reduce your network performance. Change the WEP encryption keys periodically. Change the WEP encryption keys periodically.

Many other products out there to network your house, but this is most commonly used. Many other products out there to network your house, but this is most commonly used.

OK. So, that’s nice. OK. So, that’s nice. NOW WHAT DO I DO? NOW WHAT DO I DO?

Inventory: Inventory: Desktop with NIC card Desktop with NIC card Laptop with wireless card Laptop with wireless card Cable modem (example, Adelphia) Cable modem (example, Adelphia) 2 cat 5 cables 2 cat 5 cables

1. Ensure that Cable modem is working fine with desktop. (this eliminates the possibility that your actual connection is problematic) This should already be set up according to the instructions from your service provider This should already be set up according to the instructions from your service provider

2. Jot down your desktop Mac address (win2k and above) --start/run/type: cmd (hit enter) --type: ipconfig /all (hit enter) --locate physical address/MAC address for the local area connection

3. Do the same for the laptop, but jot down the wireless card MAC address…then turn all computers and modems off.

Now, the Setup…

NON-CD rom instructions 4. With everything off, unplug the cat 5 cable (that connects you to your cable modem) from the back of the desktop.

5. Plug that cable into the WAN/Internet port on your router (or whichever port your instruction manual indicates).

6. Connect your main PC with to an open port on your router with your additional cat 5 cable.

7. Plug in your power cable to the router and the outlet.

8. (not the laptop yet)

9.

10.

11. We will skip the “configure pc” section of the Linksys instructions, as your pc should be fine if it connected with your cable/dsl. However, refer to it if you need to.

12.

13.

14. You will find instructions on the CD or the Manufacturer website as to whether you need Domain Name or Host Name fields for your ISP. Otherwise, you may have to ask you ISP… If unsure, try it without at first.

15. For the configuration type setting, you will usually use Automatic Configuration.

NOTE: for Adelphia, and possibly others, you may have to enter your computer MAC address in the CLONE Mac address section of your setup.

16. When you are finished with the configuration, (be sure to change that admin password!!!!) choose save settings.

You can now restart your computer and check to see if you are able to connect to the internet. If you are not, please refer to the troubleshooting information that came with your router (may be on the CD)

17. Let’s go back into our browser and into our configuration:

18.

19. Leave the wireless mode on Mixed.

20. Wireless Network Name (SSID) you should CHANGE! 21. Select your wireless channel..

22. Note, I keep mine on broadcast, yet I encrypt the connection.

23. Setting encryption… THIS IS HIGHLY RECOMMENDED. Prevents those who do not have the encryption key from connecting to your network

24. MAC filtering. You may also enter MAC addresses for computers, so that only they connect.

25. Save settings and turn on your laptop.

If you have your SSID broadcasted, your laptop should pick the network up. It may ask you if it should connect…

You must configure the laptop to your new router.

26. A. accept the connection and go into properties. B. go into start/settings/networks and right click on the wireless connection and choose properties. Then go into Wireless Networks.

27. You can choose ADD to add your network if it does not appear. You will need your SSID, WEP key, etc to fill in the blanks. (note, you if you have WEP key, uncheck the “key is provided” box to enter the key manually)

28. Configure your connection according to the configuration on your router, and click ok until you are out of the settings.

You may now try and connect to the internet! Please refer to your troubleshooting guide if you have any problems.

Notes The instructions were based on a Linksys router and Adelphia Broadband connections. Instructions may vary depending on the brand of router and ISP you may have.

FAQ’s Q. How much does a router cost? A. Routers are usually sold with a rebate, so lately you can get them from $30-$60 depending on sale.

FAQ’s Q. What about the other items. A. If you do not already have them, they usually run: Cable modem: $60 Cable modem: $60 NIC for desktop: $15-$30 NIC for desktop: $15-$30 Cat 5 cable: $6 Cat 5 cable: $6 Wireless card for laptop: $30-$60 Wireless card for laptop: $30-$60

FAQ’s Q. Does my machine have a NIC or wireless card? A. If it is fairly new, yes, it probably does. Check your packing slip, or the device manager.

FAQ’s Q. Can I do all of this with a WINME or 98 computer? A. Well, yes. But it is time to upgrade. It is 2004 folks A. Well, yes. But it is time to upgrade. It is 2004 folks

Audience Q and A. Thank you!