Router configurations setting

Slides:



Advertisements
Similar presentations
CY-SWR1100 Dual Band Wireless N Router
Advertisements

DSL-2730B, DSL-2740B, DSL-2750B.
Subnet of 8 IPs Configuration. Calculating The Subnet of 8IPs To calculate Subnets of 8 IPs go to This.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
DSL-2870B How to Change ADSL Username and Password in your modem router How to Change Wireless Channel in your modem router How to Open Ports in your modem.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
IDS configuration Yun Wang Martin Olsen Anna Paitian.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Chapter 9 Connecting to and Setting up a Network
DVG-N5402SP.
DHP-306AV & DHP-W306AV. Agenda: How to change Encryption on a DHP-306AV How to change the Device Password on a DHP-306AV What will happen if the Device.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
AP (Access Point) Client Operation Mode : Bridge Mode: AP IP Address: DHCP: Server Operation Mode : Bridge Mode: Client IP Address:
Linksys LNKWET11 Setup b Ethernet Converter Step 1. Annotate your Computer’s ethernet IP address. Step 2. Change the Ethernet IP Address/subnet/router.
Port Forwarding NeCrOs © 2008 Linksys® Routers Edition 1.What is Port Forwarding? 2.How to Port Forward? 3.How to Port Trigger? (Alternative Way) 4.How.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Lexmark Wireless Printer Adaptor Instructions Step 1. For a Mac, go to network preferences/ select built-in-ethernet and click on TCP/IP tab and annotate.
LPHI ITG Emergency Preparedness Information Sessions & Training.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
How to setup Genesis LC1 and Genesis Flex with the Buffalo Access Point to maximize wireless performance…
Steps To Set Up Your Home Wireless Network You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf.
DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router
WIRELESS NETWORKS AT HOME Presentation 9 th December 2004 Simon G Fraser.
Page 1 Access Lists Lecture 7 Hassan Shuja 04/25/2006.
Doc.: IEEE /044r0 Submission January 2003 Al Petrick, IceFyre, Tim Godfrey, IntersilSlide 1 Electronic Attendance and Server Update Tim Godfrey.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.
1 Main Menu Right click live monitoring screen to bring up top menu bar. Pull mouse down from first icon to pull up main menu icon Click on Main Menu icon.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
L ESSON OBJECTIVES Students will: Describe what data security is and why it is important to keep information safe. Explain how encryption and passwords.
Unit 2 - Hardware Networking. What is a network? A computer network is essentially a connection between two or more computers. This connection can be.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Understanding Cisco Router Security.
CSC 116 Nov Administrative Required 2 nd exam will be next week on Wed  Nov 18th It will be short (10 questions) It will only cover chapters.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Accessing Your Documents from Your Personal Computer.
HotSpot Software helps you control and bill Internet access by redirecting your customers to sign-in or pay on your login page HotSpot software lets you.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Silver Fox Surfers Online Safety
Methods of Securing LANs
Instructor Materials Chapter 9: Testing and Troubleshooting
Securing A Wireless Network
Web Security for Field Engineers practice-questions.html.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS
FIXMYWIFI EXTENDER. STEP 1: OPEN THE DEVICE FROM THE PACKED BOX, THEN CONNECT THE ANTENNA TO THE DEVICE, AFTER COMPLETING THE PROCESS OF CONNECTING.
Testing POP Access with Telnet The Technology Firm Tony Fortunato.
Welcome! IE 7 Test Drive Presented by the Office of Information Technology.
Providing feedback with SETU
Examining IP Addressing
Powerschool for Parents
SY604 NAT PPPoE Configuration
Toll Free No TurboTax Forgot Password.
Configure a Wireless Router
Financial Aid Office.
Password AL-Salman Mohammed Mohammed Ali Rayan Rasheed.
HAWTHORNS SURGERY – ONLINE SERVICES
Network Addressing.
Presentation transcript:

Router configurations setting VP-FLT-FLT. Router configurations setting Router configurations setting Name: MOHAMMED ALI AL-SALMAN ID: 202624031 Name: MOUSA KADEHM AL-SAEED ID: 202624003 18/10/2016

General overview VP-FLT-FLT. Router configurations setting Fined the router IP address. Defined the default password and username. Choose a strong password. The different types of encryptions. Change the password and SSID. MAC address filtering and Block. 18/10/2016 Page 1

Objectives VP-FLT-FLT. Router configurations setting Explain how to find the IP address of your router. Explain how to find the router default username and password for the web page. The best way to choose a strong passwords. Show the different types of encryptions. Explain how to change the password and SSID.   Present how to enable MAC address filtering. 18/10/2016 Page 2

Fined the router IP address VP-FLT-FLT. Router configurations setting Fined the router IP address There are many different ways to figure out what your router IP address is. One quick method is to open a Windows command prompt and then use the command line tool ipconfig. 18/10/2016 Page 3

Defined the default password and username VP-FLT-FLT. Router configurations setting Defined the default password and username If You Don not Know the password and the username you can use the website to find the default password and username. http://www.routerpasswords.com 18/10/2016 Page 4

Choose a strong password VP-FLT-FLT. Router configurations setting Choose a strong password 1- Not less than 10 characters: Create a long password with 14 to 20 characters. 2- mixture of letters, numbers and symbols. Letters: A,B,a,b….. Numbers:1,2,3,4…. Symbols:` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? / 3- Don’t use one word 18/10/2016 Page 5

The different types of encryptions VP-FLT-FLT. Router configurations setting The different types of encryptions 18/10/2016 Page 6

Change the password and SSID VP-FLT-FLT. Router configurations setting Change the password and SSID SSID stands for Service Set Identifier, and is a string of up to 32 characters 18/10/2016 Page 7

MAC address filtering and Block VP-FLT-FLT. Router configurations setting MAC address filtering and Block 18/10/2016 Page 8

VP-FLT-FLT. Router configurations setting Practical 18/10/2016 Page 9

References http://setuprouter.com/ http://www.routerpasswords.com VP-FLT-FLT. Router configurations setting References http://setuprouter.com/ http://www.routerpasswords.com 18/10/2016 Page 10

Test Online VP-FLT-FLT. Router configurations setting 18/10/2016 Page 11