0% found this document useful (0 votes)
93 views23 pages

Wireless Network Configuration Guide

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views23 pages

Wireless Network Configuration Guide

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Configuring the Wireless Network

Having a wireless network will let people communicate and access applications and
information without physical wirings. This advantage of cleaner, tidier, and freer space
lets people access the internet with ease.
Broadband Internet Connection
Nowadays, broadband Internet connection is used instead of the dial-up
connection. DSL, which stands for Digital Susbscriber Line, and cable are two common
broadband connections.

ISPs provide the broadband connection. For example, PLDT, a telephone company,
provides DSL, and SKY, a cable TV company, provides internet connection too. These ISPs
provide broadband modems, and nowadays, even combination modem/wireless routers.
Wireless Router

A wireless router is essential in a WLAN for home and small office networks. It allows
connection to the Internet as well as local network access. The router can be connected through
a wired or wireless WAN.

There are varieties of routers still being developed and improved today that allow
capabilities such as being able to filter traffic.

All modern routers nowadays support 802.11n, or Wireless-N, which offer the most
stable speeds. These router still offer backward compatibility with older standards like
the 802.11g.
Wireless Router: Positioning the Wireless Router
The wireless router is ideally placed somewhere in the home/small office
where it can receive a strong signal and has least amount of interference.

Follow these guidelines to ensure the best out of your wireless router:

1. Position the router in the center of the house.

2. Raise the router from the floor

3. Move it away from walls and metal objects.

4. Reduce interference by placing it away from microwaves/cordless phones.


Securing the Wireless Network

Security is important especially in the workplace where confidential files are being
transferred throughout. The network's signal may even extend outside your home and may
be accessed by people outside.

That is why it is important to set certain protocols in ensuring privacy of


personal
information and files as these can lead to identity theft or malicious practices.

Simply putting a network security key to your wireless router can prevent
unauthorized access to the network.
Securing the Wireless Network :Wireless
Network Security Protocols
There are three types of wireless network encryption: (1) Wi-Fi Protected
Access, or WPA and WPA2, (2) Wired Equivalent Privacy (WEP), and (3) 802.1x,
however this is usually used in enterprise.

1. Wi-Fi Protected Access (WPA and WPA2)


This security method encrypts the information and assures that the security key has not
been modified. WPA is for all wireless network adapters, but not in older routers and access
points. WPA2 is a secure version, but does not work in older adapters.

2. Wired Equivalent Privacy (WEP)


This is an older method but not recommended anymore. When enabled, the security
key is set up. This key encrypts the information that one computer sends to another through
the network. This, however, is easy to crack.

3. 802.1X Authentication
This helps improve security for 802.11 wireless networks and wired Ethernet networks.
It makes use of a server to validate users and provide network access. This is common in
workplaces.
Wireless Network Configuration
We can divide wireless network configuration into three tasks.

To start, we are installing the router to the


computer:

(1) Using a cable, connect the router to the


computer

(2) Open the internet browser and type the


default IP Address (usually 192.168.0.1). This
is also found at the sticker under the router.

(3) Read the instructions, because this will


depend on the manufacturer. Usually the
username and password are "admin".

(4) You can explore the interface and configure


wireless set-up such as the SSID or the name
of the router, the password (e.g. WAP2), or the
MAC Address.
Wireless Network Configuration

Next, we can set-up a security key:

(1) Open Network and Sharing


Center (Start> Control Panel > Network and
Sharing Center)

(2) Click Set up a new connection or


network.

(3) Click Set up a new network, then next.

The wizard will walk you through with a


network name and security key; the default
will be a Wi-Fi WPA2.
Wireless Network Configuration
Then, we can add computers to the network:

(1) Open Connect to a Network. Click the network icon in the lower-right.

(2) In the list of networks, click where you want to connect. Click Connect.

(3) Enter the security key.


Wireless Network Configuration:

1. Changing Router Username and


Password

2. Changing Wireless Name and Security


The Key
difference is that the previous topic is on the administrative privileges of
accessing the router itself while this is when you connect wirelessly; what name appears on
your phone's wi-fi connection options.

3. MAC Address Reservation


This is done when you want to reserve specific devices to connect exclusively to the
router, no matter how much limit you put into wireless devices to connect, for example. Each
device has a MAC Address so this means that you are reserving these devices. Most of the
time these devices are your own or the family's. So no matter how many neighbors or friends
connect to your router, and you've limited to only 5, for example, your devices will still
connect.
Wireless Network Configuration:

4. Creating a Workgroup
This is especially important when you want to create a tightly-bound local area
network connection within your office, as an example. This will also be useful for servers later.
Wireless Network Configuration:
5. Wireless Repeater Configuration
When we find dead spots in the house, or the wireless router is not able to reach the
whole house, wireless repeaters are used. These are basically extenders that can connect via
wire or wireless connections.
Wireless Network Configuration:
6. Wireless Access Point
Securing the Network
There are many security threats that are spread over the internet.
Viruses, worms, Trojan horses, zero-day attacks, hacker attacks, denial of service (DOS)
attacks, data interception, and theft.

That is why it is important that there are security protocols aside from router
configuration to further protect the network. It is wise to prevent these threats from entering
and spreading on the network.
Network Security Components

To avoid these security threats, it


is important that we have network
security components. These are software
applications that protect the usability,
reliability, integrity, and safety of the
network and the data.

These components include anti-


virus and anti-spyware programs, firewalls (to
block unauthorized access to the
network, intrusion prevention systems, or
IPS, (to identify fast-spreading threats such as
zero-day or zero-hour attacks), and Virtual
Private Networks, or VPNs, (to provide secure
remote access).
Network Security Components : Firewall

Basically, a firewall is a device -- that can be


hardware or software based -- which controls
access to the organization's network.

There are several types of firewalls depending on


the security needed by the network.
Network Layer Firewalls
These operate at a low level of TCP/IP protocol where packets are not allowed to pass through
unless they match the rules set by the firewall administrator.
Application Layer Firewalls
These work on the application level of the TCP/IP stack. These can intercept all packets traveling to
or from the application. They can block other packets - unwanted outside traffic can be prevented.
Application Firewalls
These are network-layer and application-layer types that overlap. An example is
restricting ftp services through /etc/ ftpaccess file.
Proxy Firewalls
These operate at the firewall's application layer. These act as intermediary for requests from one
network to another for a specific network application. These prevent direct connections between
either sides; allowing or blocking traffic based on the rules set.
Inspect and Test Networks

It is important to test computer networks to assure that these networks


will be effective especially in the long run.

Aside from ensuring that these networks are secure, it is essential that
we know in the first place that they are working correctly to avoid issues in the
future.
Network Testing

Network Testing is the actual


measurement of the network's state of
operation over a period of time. This record
will be the basis for comparison or control.

It is often called understanding the


past to predict the future.

A good network testing strategy is one where the network manager is able to predict the
operation of the network.

Testing the reliability and its ability to support new applications and users are among the list
of factors in examining a good network.
Important Network Characteristics
Through a comprehensive network test, the network manager is able to maintain a
network actively. When it is implemented properly, it is easy to track the changes and
trends that can be seen in its daily operation.

From here, a network manager is able to obtain valuable insight where s/he may
use for further improvements and troubleshooting.

We should look for the following when we are testing the network:

(1) Utilization levels

(2) Number of users

(3) Number of operational protocols

(4) Error statistics

(5) Application utilization


Final Testing

Final testing aims to test the hardware


and software aspect of the systems and
the network.

Follow the following steps.

(1) Launch cmd by CTRL+R, typing cmd, then


press enter.

(2) Type ping and the IP address of a comptuer


in the network. If the timeout does not
request, it means that the computer is
connected to the network.

(3) You can log-on to the network as well by


accessing your network device. Observe
the color of the NIC on the computer; the light
should be green or yellow and has one solid
and a blinking light.
Generating Reports
Network testing will essentially need documentation and reports from the computer.
This is important since this will be used for maintenance.

The following steps may require you to be an Administrator to access some of the
features in this procedure.
To enable diagnostic logging,

(1) Open the Network Connections folder and view the available connections.

(2) Press ALT to display the menu bar, then access Advanced, click Remote Access
Preferences.

(3) Access Diagnostics, you can do one or more of the following:


a) You can enable logging for all remote access connections. Select Enable
logging. Then click Generate Report.
b) You can clear logs that were created during previous connection attempts.
Select Clear Log. Then click Generate Report.

To view this report, click View Report.


To save it to a file, click Save report to this file.
To send report to an e-mail address, click Send report to this e-mail address.
To generate a more concise report, click Generate summary report.

You might also like