CSC 116 Nov
Administrative Required 2 nd exam will be next week on Wed Nov 18th It will be short (10 questions) It will only cover chapters 8 and 9 Network topics (we will review on Mon Nov 16th) It will count as a class project NO SCHOOL WED NOV 11 th
Today Firewalls Small Office/Home Office Router setup
Quick Review: OSI Model Picture Credit: blog.butchevans.com
Encapsulation Data
Quick review: IP Addresses Two Types IPv4: 32-bit addresses Use “Dotted-Decimal” ( ) IPv6: 128-bit addresses Use hexadecimal ( 3ffe:1900:4545:1243:2001:f8ff:fe21:67cf)
Quick review: Transport Layer Transmission Control Protocol Reliable and connection-oriented User Datagram Protocol Unreliable and connectionless Both work with segments, use source and destination ports, and use checksums
Quick review: TCP and UDP
Firewalls can block network traffic Block incoming or outgoing network traffic based on rules Rules are usually based on IP addresses or ports Can be network-based or host-based Can be default-permit or default-deny
Windows firewall prompt
Barracuda Networks Firewall
Small Office/Home Office Router Image source: newegg.com
Setting up a SOHO router
SOHO router is many devices in one Router : routes traffic between local network and ISP network Switch: Allows multiple devices to be connected by connecting cables Wireless Access Point: Allows multiple devices to be connected over WiFi DHCP server: Assigns IP addresses to devices on the local network Firewall: Blocks certain traffic based on IP addresses and ports
Typical Setup Plug internet into WAN port, plug computers into LAN ports Configure router through web interface Usually something like Consult your documentation It may ask for a username and password Consult your documentation Change the password to log in Change the WiFi SSID and password
WiFi Security Open – Might be ok in some situations WPA2 – Always use this if you can Hidden SSID – Adds some security by requiring people to type in the SSID before they can connect Provides weak security MAC Address filtereing – Allow only known physical devices to connect to your network Provides weak security