0% found this document useful (0 votes)
20 views

Router Configuration

Uploaded by

sw4t.cat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Router Configuration

Uploaded by

sw4t.cat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

ROUTER

CONFIGURATION
Router
•a hardware component that allows
computers to connect with each other
and other computer hardware.
•a router links two networks together
•designed to receive, analyze and move
incoming packets to another network.
Packets
•is used to describe a segment of data sent
from one computer or device to another over
a network.
• contains a source, destination, data, size, and
other useful information that helps packet make it
to the appropriate location and get reassembled
properly
Packets
A router performs the following functions:
•IP sharing: A router manages those multiple
connections and ensures that the right packets
of information go to the right places.
•Network Address Translation (NAT): modifies
the headers in packets of information coming
into and out of your network so that they get
routed to the proper device
A router performs the following functions:
• Dynamic Host Configuration: Without DHCP you
would have to manually configure and add all the
hosts to your network.
• Firewall: Routers act as basic firewalls in a variety of
ways including automatically rejecting incoming data
that is not part of an ongoing exchange between a
computer within your network and the outside
world.
GATEWAY
VS ROUTERS
Gateways
•joins two networks so the devices on one
network can communicate with the
devices on another network.
• are network protocol converters -
facilitates compatibility between the two
protocols.
What they have in common?

•Routers and gateways are used to


regulate network traffic between two
or more separate networks.
And now the differences are…

•Gateways regulate traffic between two


dissimilar networks, while routers
regulate traffic between similar
networks.
A router is a common type of
gateway used in home
networks.
ACCESS POINT
VS ROUTERS
Access Point
•Alternatively referred to as a base
station and wireless router
•a wireless receiver which enables a user to
connect wirelessly to a network or the Internet.
•This term can refer to both Wi-Fi and Bluetooth
devices
And now the differences are…

•Simply put a router can equally


distribute data across all users
•An access point, is basically a
switch/hub, but wireless.
And now the differences are…

•Router operates between networks and


routes traffic between them.
•Whereas an access point will operate in
a single network and is used to
wirelessly extend your existing
network.
A router can be an access
point but an access point
can’t be a router.
WIFI
BOOSTER
Wi-fi booster
•extends WiFi network coverage space by
amplifying existing signals.
•It is a unique solution that works by pulling in
an existing weak Wi-Fi from transmitter.
•It then amplifies it before broadcasting the
transmission to more spaces where needed.
Are Wi-Fi Repeaters And Wi-Fi Extenders The
Same?
• A Wi-Fi extender performs by pulling the reception from a
router before relaying it to a device. While doing this, the
extender is not transmitting the coverage using the same
type of network name as the initial wireless network.
• For instance, if the original or initial network is known as
“WirelessNet1” the extender will produce a new network
name such as “WirelessNet2’. For your device to connect to
the internet as desired, it must connect to “WirelessNet2”.
Are Wi-Fi Repeaters And Wi-Fi Extenders The
Same?
•The repeater works by repeating the signal
received even as the transmission is relayed to
a wireless device. It means you will be using a
similar wireless network ID as you initially
began with.
#KnowledgeInRouterIsPower
HOW TO
CONFIGURE A
ROUTER
Part 1: Connecting to the Router
• 1. Connect your router to
your computer and your
modem. Use Ethernet
cables to connect your
modem to the WAN/ WLAN/
Internet port on your router,
and connect your computer
to the “1”, “2”, “3”, or “4”
port on the router.
2. Open a web browser.
•Your router’s
configuration page
can be accessed by
any computer that is
connected to the
same network.
3. Enter in your router’s address.
• Routers are accessed
through your web browser
by entering the IP address
into the address bar.
• Most routers have their
default address printed in
the documentation or on a
sticker on the router itself.
4. Enter in your username and password.
• Before you access the
configuration page, you’ll be
asked for a username and
password. Most routers will
come with a default
username/ password combo,
while some allow you to
proceed without entering
anything.
4. Enter in your username and password.
•Your router’s documentation will tell you the
default username and password required. They
may also be printed on the router itself.
•”admin” is one of the most common default
usernames.
•”admin” or “password” are two of the most
common passwords.
5. Reset your router if you can’t access it.
• If you’ve looked up your
default address and
username/password combo
and you still can’t access your
router, you can reset it to
factory defaults to clear out
any changes that may have
been made.
5. Reset your router if you can’t access it.
• You can reset your router by pressing the Reset button
on it. This button is usually small and recessed, and
can only be reached by a paper clip. Some routers
have a button that can be pressed more easily.
• After pressing the reset button, wait 30-60 seconds
and then try entering the router’s address and
username/password combination again.
6. Assign the router a new username and
password.
• Leaving your router with
the default username and
password is very insecure,
and you should change it
immediately after setting it
up. You can usually find this
in the Administration
section of the router
configuration.
Part 2: Setting up a Wireless Network
1. Go to Wireless>Wireless
Settings and configure
the SSID (Network name)
which can be the same or
different from the main
router’s.
• Select Save.
Part 2: Setting up a Wireless Network
2. Go to Wireless>Wireless
Security and configure the
wireless security.
WPA/WPA2-Personal is
recommended as the most
secure option. Once
configured, click Save.
3. Go to DHCP>DHCP Settings and select Disable
the DHCP Server. Select Save.
4. Go to System Tools>Reboot and
select Reboot to reboot the device.
WIRELESS
SECURITY
TECHNIQUES
Different Levels of Wireless Security
•No security
•Wired Equivalent Privacy (WEP)
•Wi-Fi Protected Access (WPA)
•Wireless Transport Layer Security (WTLS)
•Lightweight Extensible Authentication
Protocol (LEAP)
No security:
•Although you can elect to
implement no security, you leave
your wireless network
completely vulnerable to attack.
Wired Equivalent Privacy (WEP)
•was the first-generation security standard for
wireless network.
•enable a group of devices on a local network
to exchange encrypted (mathematically
encoded) messages with each other while
hiding the contents of the messages from
easy viewing by outsiders.
Wired Equivalent Privacy (WEP)
•WEP keys are a sequence
of hexadecimal values taken from the
numbers 0-9 and the letters A-F. Some
examples of WEP keys are:
•1A648C9FE2
•99D767BAC38EA23B0C0176D152
Wired Equivalent Privacy (WEP)
•WEP 64:
• The first-generation security standard for wireless
network. It could be exploited because of an
encryption key that was vulnerable to decoding.
•WEP 128:
• An enhanced encryption protocol combining a 104-bit
key and a 24-bit initialization vector.
Wired Equivalent Privacy (WEP)
•The required length of a WEP key
depends on which version of the WEP
standard the network is running:
•40- or 64-bit WEP: 10 digit key
•104- or 128-bit WEP: 26 digit key
•256-bit WEP: 58 digit key
Wi-Fi Protected Access (WPA):
•An improved version of WEP.
•It was created as a temporary solution until
802.11i (a security layer for wireless systems)
was fully implemented.
•Now that 802.11i has been ratified, WPA2
has been released. It covers the entire 802.11i
standard.
Wi-Fi Protected Access (WPA):
• The most common WPA configuration is WPA-PSK
(Pre-Shared Key).
• includes message integrity checks (to determine
if an attacker had captured or altered packets
passed between the access point and client)
• Includes Temporal Key Integrity Protocol (TKIP) -
employs a per-packet key system that was radically
more secure than the fixed key system used by WEP
Wireless Transport Layer Security
(WTLS)
•is a security layer used in mobile devices that
employ the Wireless Applications Protocol
(WAP).
•was designed to provide security for WAP
devices in a bandwidth-efficient manner.
Lightweight Extensible
Authentication Protocol (LEAP):
•Also called EAP-Cisco
•is a wireless security protocol created by
Cisco to address the weaknesses in WEP
and WPA.
•is a good choice when using Cisco
equipment in conjunction with operating
systems such as Windows and Linux.
Additional Techniques
in Securing your
Wireless Connection
Securing Your Wi-Fi Network
• Change the default administration password.
• Disable the broadcasting of the Service Set Identifier
(SSID) to hide it from other users.
• Use MAC filtering to protect the network from other
users.
• Change the default values of the SSID by entering the
setup program for the access point and renaming the
SSID.
Securing Your Wi-Fi Network
•Update to the latest available firmware.
•Install or activate a firewall, and adjust the
settings to eliminate all traffic except the
desired network settings.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy