Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bag-O-Bytes October 6 th, 2004 Home Networking Presented by The FPB Help Desk x6322.

Similar presentations


Presentation on theme: "Bag-O-Bytes October 6 th, 2004 Home Networking Presented by The FPB Help Desk x6322."— Presentation transcript:

1 Bag-O-Bytes October 6 th, 2004 Home Networking Presented by The FPB Help Desk x6322

2 Please Save All Questions Until the End of the Presentation

3 For use with DSL/Cable connections For use with DSL/Cable connections Not for Dial in Not for Dial in Connects a variety of computers Connects a variety of computers Wired and wirelessly Wired and wirelessly

4 Key component: Key component: A ROUTER! A ROUTER!

5 Example: Wireless-G Broadband Router Example: Wireless-G Broadband Router All-in-one Internet-sharing Router, 4-port Switch, and Wireless-G (802.11g) Access Point All-in-one Internet-sharing Router, 4-port Switch, and Wireless-G (802.11g) Access Point Shares a single Internet connection and other resources with Ethernet wired and Wireless-G clients Shares a single Internet connection and other resources with Ethernet wired and Wireless-G clients Wireless data rates up to 54Mbps -- 5 times as fast as Wireless-B (802.11b), but also interoperable with Wireless-B devices (at 11Mbps) Wireless data rates up to 54Mbps -- 5 times as fast as Wireless-B (802.11b), but also interoperable with Wireless-B devices (at 11Mbps) Advanced security: Wi-Fi Protected Access™ (WPA), wireless MAC address filtering, powerful SPI firewall Advanced security: Wi-Fi Protected Access™ (WPA), wireless MAC address filtering, powerful SPI firewall

6 More: The Linksys Wireless-G Broadband Router is really three devices in one box. More: The Linksys Wireless-G Broadband Router is really three devices in one box. First, there's the Wireless Access Point, which lets you connect Wireless-G or Wireless-B devices to the network. First, there's the Wireless Access Point, which lets you connect Wireless-G or Wireless-B devices to the network.

7 There's also a built-in 4-port full- duplex 10/100 Switch to connect your wired-Ethernet devices. Connect four PCs directly, or daisy-chain out to more hubs and switches to create as big a network as you need. There's also a built-in 4-port full- duplex 10/100 Switch to connect your wired-Ethernet devices. Connect four PCs directly, or daisy-chain out to more hubs and switches to create as big a network as you need.

8 Finally, the Router function ties it all together and lets your whole network share a high-speed cable or DSL Internet connection, files, and other resources such as printers and hard disk storage space. Finally, the Router function ties it all together and lets your whole network share a high-speed cable or DSL Internet connection, files, and other resources such as printers and hard disk storage space.

9 How are you protected with your new wireless router? How are you protected with your new wireless router? Linksys: To protect your data and privacy, the Wireless-G Broadband Router can encode all wireless transmissions using 128-bit WEP encryption. Linksys: To protect your data and privacy, the Wireless-G Broadband Router can encode all wireless transmissions using 128-bit WEP encryption.

10 Hackers!!! Hackers!!! One result of this, seen in many large cities and business districts, is called “Warchalking”. This is one of the terms used for hackers looking to access free bandwidth and free Internet access through your wireless network. One result of this, seen in many large cities and business districts, is called “Warchalking”. This is one of the terms used for hackers looking to access free bandwidth and free Internet access through your wireless network.

11 Some steps to take: Some steps to take: Change the router’s administrator password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly. Change the router’s administrator password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

12 More steps: More steps: SSID. There are several things to keep in mind about the SSID: SSID. There are several things to keep in mind about the SSID: Disable Broadcast Disable Broadcast Make it unique Make it unique Change it often Change it often

13 Some additional info on SSID: Some additional info on SSID: Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID. Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

14 Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

15 Change your SSID regularly so that any hackers who have gained access to your wireless network will have start from the beginning in trying to break in. Change your SSID regularly so that any hackers who have gained access to your wireless network will have start from the beginning in trying to break in.

16 MAC Addresses: MAC Addresses: A unique hex character address on every network/modem/wifi card A unique hex character address on every network/modem/wifi card Ex: 00-20-ac-d6-ed-f2 Ex: 00-20-ac-d6-ed-f2 How to find: How to find: Go to start/run and type: cmd (hit enter) Go to start/run and type: cmd (hit enter) Type: ipconfig /all (hit enter) Type: ipconfig /all (hit enter)

17 MAC cont: MAC cont: MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address. MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

18 WEP security: WEP security: WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult. WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult. If you are transmitting sensitive data over your network, encryption should be used. If you are transmitting sensitive data over your network, encryption should be used.

19 WEP cont: WEP cont: There are several ways that WEP can be maximized: There are several ways that WEP can be maximized: Use the highest level of encryption possible Use the highest level of encryption possible Use a “Shared” Key Use a “Shared” Key Use multiple WEP keys Use multiple WEP keys Change your WEP key regularly Change your WEP key regularly

20 So, overall, here are some tips! Change the default SSID. Change the default SSID. Disable SSID Broadcasts. Disable SSID Broadcasts. Change the default password for the Administrator account. Change the default password for the Administrator account. Enable MAC Address Filtering. Enable MAC Address Filtering. Change the SSID periodically. Change the SSID periodically. Enable WEP 128-bit Encryption. Please note that this will reduce your network performance. Enable WEP 128-bit Encryption. Please note that this will reduce your network performance. Change the WEP encryption keys periodically. Change the WEP encryption keys periodically.

21 Many other products out there to network your house, but this is most commonly used. Many other products out there to network your house, but this is most commonly used.

22 OK. So, that’s nice. OK. So, that’s nice. NOW WHAT DO I DO? NOW WHAT DO I DO?

23 Inventory: Inventory: Desktop with NIC card Desktop with NIC card Laptop with wireless card Laptop with wireless card Cable modem (example, Adelphia) Cable modem (example, Adelphia) 2 cat 5 cables 2 cat 5 cables

24 1. Ensure that Cable modem is working fine with desktop. (this eliminates the possibility that your actual connection is problematic) This should already be set up according to the instructions from your service provider This should already be set up according to the instructions from your service provider

25 2. Jot down your desktop Mac address (win2k and above) --start/run/type: cmd (hit enter) --type: ipconfig /all (hit enter) --locate physical address/MAC address for the local area connection

26 3. Do the same for the laptop, but jot down the wireless card MAC address…then turn all computers and modems off.

27 Now, the Setup…

28 NON-CD rom instructions 4. With everything off, unplug the cat 5 cable (that connects you to your cable modem) from the back of the desktop.

29 5. Plug that cable into the WAN/Internet port on your router (or whichever port your instruction manual indicates).

30 6. Connect your main PC with to an open port on your router with your additional cat 5 cable.

31 7. Plug in your power cable to the router and the outlet.

32 8. (not the laptop yet)

33 9.

34 10.

35 11. We will skip the “configure pc” section of the Linksys instructions, as your pc should be fine if it connected with your cable/dsl. However, refer to it if you need to.

36 12.

37 13.

38 14. You will find instructions on the CD or the Manufacturer website as to whether you need Domain Name or Host Name fields for your ISP. Otherwise, you may have to ask you ISP… If unsure, try it without at first.

39 15. For the configuration type setting, you will usually use Automatic Configuration.

40 NOTE: for Adelphia, and possibly others, you may have to enter your computer MAC address in the CLONE Mac address section of your setup.

41 16. When you are finished with the configuration, (be sure to change that admin password!!!!) choose save settings.

42 You can now restart your computer and check to see if you are able to connect to the internet. If you are not, please refer to the troubleshooting information that came with your router (may be on the CD)

43 17. Let’s go back into our browser and into our configuration:

44 18.

45 19. Leave the wireless mode on Mixed.

46 20. Wireless Network Name (SSID) you should CHANGE! 21. Select your wireless channel..

47 22. Note, I keep mine on broadcast, yet I encrypt the connection.

48 23. Setting encryption… THIS IS HIGHLY RECOMMENDED. Prevents those who do not have the encryption key from connecting to your network

49 24. MAC filtering. You may also enter MAC addresses for computers, so that only they connect.

50 25. Save settings and turn on your laptop.

51 If you have your SSID broadcasted, your laptop should pick the network up. It may ask you if it should connect…

52 You must configure the laptop to your new router.

53 26. A. accept the connection and go into properties. B. go into start/settings/networks and right click on the wireless connection and choose properties. Then go into Wireless Networks.

54

55 27. You can choose ADD to add your network if it does not appear. You will need your SSID, WEP key, etc to fill in the blanks. (note, you if you have WEP key, uncheck the “key is provided” box to enter the key manually)

56

57 28. Configure your connection according to the configuration on your router, and click ok until you are out of the settings.

58 You may now try and connect to the internet! Please refer to your troubleshooting guide if you have any problems.

59 Notes The instructions were based on a Linksys router and Adelphia Broadband connections. Instructions may vary depending on the brand of router and ISP you may have.

60 FAQ’s Q. How much does a router cost? A. Routers are usually sold with a rebate, so lately you can get them from $30-$60 depending on sale.

61 FAQ’s Q. What about the other items. A. If you do not already have them, they usually run: Cable modem: $60 Cable modem: $60 NIC for desktop: $15-$30 NIC for desktop: $15-$30 Cat 5 cable: $6 Cat 5 cable: $6 Wireless card for laptop: $30-$60 Wireless card for laptop: $30-$60

62 FAQ’s Q. Does my machine have a NIC or wireless card? A. If it is fairly new, yes, it probably does. Check your packing slip, or the device manager.

63 FAQ’s Q. Can I do all of this with a WINME or 98 computer? A. Well, yes. But it is time to upgrade. It is 2004 folks A. Well, yes. But it is time to upgrade. It is 2004 folks

64 Audience Q and A. Thank you!


Download ppt "Bag-O-Bytes October 6 th, 2004 Home Networking Presented by The FPB Help Desk x6322."

Similar presentations


Ads by Google