LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:

Slides:



Advertisements
Similar presentations
Hub A hub is a device that connects PCs together All hubs Contain multiple access ports the hub simply forwards the packets to all the other devices connected.
Advertisements

11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Presented by Serge Kpan LTEC Network Systems Administration 1.
ROYAL PALM NETWORK PROJECT John Healy Tom Jamieson
A Guide to major network components
Networking Components Manuel Palos. HUBS Hubs are inexpensive devices that connect multiple devices t0 a network. Hubs merely pass along network data.
Computer Networking Devices Seven Different Networking Components.
Networking Components Chad Benedict – LTEC
Securing a Wireless Network
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Wireless Networking 102.
Basic Networking Components
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Networks CSCI-N 100 Dept. of Computer and Information Science.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Network Components: Assignment Three
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Common Devices Used In Computer Networks
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Hub  A hub is a piece of hardware that connects multiple wired devices together on a single network. Hubs work at the physical layer (layer 1) of the.
HUB Connects multiple workstations, servers, and other devices to a network. Can be used to connect two or more computers to one network port. Handles.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
HNC COMPUTING - Network Concepts 1 Network Concepts Devices Introduction into Network Devices.
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Network Components By: Zach Przybilla CECS 5460 Fall 2015.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
NETWORKS.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Higher Computing Networking. Networking – Local Area Networks.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
NETWORKING & SYSTEM UPDATES
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
LECTURE14 NET /3/2015Lect14 NET HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the.
Networking Components
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
ASSIGNMENT 3 - NETWORKING COMPONENTS BY JONATHAN MESA.
NETWORKING COMPONENTS Jeffery Rice LTEC Assignment 3.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Assignment 3 Jacob Seiz. Hub A hub provides a central access point for a network. Through multiple I/O ports a hub can connect multiple Ethernet devices.
Network System Security - Task 2. Russell Johnston.
Understand Wireless Security LESSON Security Fundamentals.
CompTIA Network+ N Authorized Cert Guide
Net 301 LECTURE14 12/3/2015 Lect14 NET301.
Net 301 LECTURE12 12/3/2015 Lect14 NET301.
Chapter 6 Networks Communicating and Sharing Resources
Network programming Lecture 1 Prepared by: Dr. Osama Mokhtar.
Presentation transcript:

LECTURE16 NET 301

HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are: How many wired Ethernet ports, if any, will you need? Where will these Ethernet ports need to be located? (In other words, where will the PCs and other equipment that will be plugged into these Ethernet ports be located?) Where will the router and high-speed modems be located? Answering these questions will help you understand what types of equipment you need, as well as how much cable you’ll need.

Step 2: Determine Where To Put Your Equipment Before you begin any installation, commit to the location for each piece of equipment in your network. This is critical if you’re going to run raw Cat 5 cable beneath drywall or over a ceiling, because you won’t be able to change the cable lengths if something goes wrong. In the case of a moderate-sized space–such as the Ergo office–it will be helpful to sketch the locations of each node on your network. Here are the physical locations of Ergo’s ports and other equipment: Cable modem and wired/wireless router in the back of the office. Two two-port Ethernet wall sockets downstairs, one socket in the back of the office and one socket in the front.

Step 3: Gather Your Tools And Supplies Ethernet Cable.. Cable Connectors.. Crimper.. Cable/DSL Modem. Wired/Wi-Fi Router Ethernet Hub

Step 4: Run The Cables In this step, we’ll create the “cable runs” that will establish wired connections between the Ethernet ports on the ground floor and the router and cable modem upstairs. Run cable from the router and cable/DSL modem location to the area where each Ethernet port will be located. As you run the cable to these locations, make sure you temporarily affix the Cat 5 to the wall or floor so that you have a realistic idea of how much cable you’ll need. Also: Leave yourself five or 10 extra feet at the end of the cable, just in case.

Step 5: Crimp The Cables Step 6: Connect All The Cables Together Step 7: Test Your Network Connection Step 8: Set Up Your Router

Step 9: How to Protect Your Network In general, these are the security settings you should make or adjust: Change the SSID of your router. Use a name that’s innocuous and doesn’t refer to your business. Disable your wireless router’s “SSID Broadcast setting.” This will prevent random snoopers from seeing or detecting your Wi-Fi network through ordinary means. Set up either 128-bit WEP encryption or Windows WPA encryption. This is a fairly easy process that varies depending on your router’s software. Enable the firewall on your wireless router

APPLICATIONS Applications on a LAN can range from word processing to data base management systems. The most universally used application is . software provides a user interface to help construct the mail message and an engine to move the to its destination. Depending on the address, the may be routed across the office via the LAN or across the country via LAN/WAN bridges and gateways. may also be sent to other mail systems, both mainframe- and PC-based. An important security note is that on some systems it is also possible to restrict mail users from attaching files as a part of an antivirus program. Many application systems have their own set of security features, in addition to the protection provided by the network operating system. Data base management systems, in particular, have comprehensive security controls built in to limit access to authorized users.

NETWORK MANAGEMENT The overall management of a LANis highly technical. The ISO’s network management model divides network management functions into five subsystems: Fault Management, Performance Management, Configuration Management, Accounting Management, and Security Management. Security management includes controlling access to network resources.

NETWORK MANAGEMENT Network management products, such as monitors, network analyzers, and integrated management systems, provide various network status and event history data. These and similar products are designed for troubleshooting and performance evaluation, but can also provide useful information, patterns, and trends for security purposes. For example, a typical LAN analyzer can help the technical staff troubleshoot LAN bugs, monitor network traffic, analyze network protocols, capture data packets for analysis, and assist with LAN expansion and planning.

ACCESS CONTROL MECHANISMS Network operating systems have access control mechanisms that are crucial for LAN security. For example, access controls can limit who can log on, what resources will be available, what each user can do with these resources, and when and from where access is available. Management, LAN, security, and key user personnel should cooperate closely to implement access controls.

THREATS TO LAN SECURITY People Threats.. Costly System administration error Software/programming error (bugs) Unauthorized disclosure, Unauthorized use Modification of data Theft of computer assets Alteration of software Hardware failure ( or any physical )

admin.org/secshelf/book001/16.pdf