Download presentation
Presentation is loading. Please wait.
1
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM
2
Questions How many of you have more than one computer at home? How do you connect to the Internet (DSL, cable, dialup)? How many already have a home router? Already have a wireless router?
3
Agenda What is a Home network Connecting things together Firewalls and Filtering Setting up a home router Setting up Print and File Sharing Questions
4
Home Network One or more computers connected: To the Internet with a router To the Internet with a router To each other in order to share Resources: To each other in order to share Resources: Internet Connections Sharing Files Sharing Printers
5
What is a Router Connects one network to another Sometimes called a “Gateway” In our case it connects to your cable modem or DSL Line Routers keep track of IP addresses and physical (MAC) addresses of hosts Managed (As we shall see)
6
What is a Cable/DSL Modem Usually provided and controlled by your ISP Connects your home to the Internet. This is the device that gets your public IP address Normally has no firewall protection Make sure you use the right cable
7
What is a Firewall A device the filters packets or traffic Its job is to be a traffic cop You configure the firewall: What will allow to pass What will allow to pass What will it block What will it block Hides your home network from the outside world Can be either in hardware or software
8
Firewall Protection 1.Implement a firewall (checks incoming traffic at the network before it gets to your home network) Default – Blocks all Incoming connections 2.Leaving you home network default is allow all outbound connections 3.Hardware firewalls protect you home network by stop all traffic before it get to your computers 4.Personal software firewall on your computer blocks incoming and outgoing (lets you know what is leaving your computer) Firewall Home Network Internet
9
Firewall Routers The idea is layers of protection Examples of home combo units include Dlink Dlink Dlink Netgear Netgear Netgear Linksys Linksys Linksys
10
Software Firewalls Add additional protection by: Controlling what leaves your computer Controlling what leaves your computer Adding a second level of protection Adding a second level of protection By being aware of application level attacks By being aware of application level attacks By allow you to schedule By allow you to schedule Usage of the internet by time (control access at night) By location (block content for young children)
11
Software Firewalls for Home Use McAfee Firewall McAfee Firewall Symantec’s Norton Personal Firewall Symantec’s Norton Personal Firewall Zone AlarmZone Alarm (Free) Zone Alarm Computer Associates with Firewall (free) Computer Associates with Firewall (free) Windows Firewall in XP Service Pack 2 (free)
12
XP Service Pack 2 1.Backup you computer 2.Do you have old hardware ? 3.Have you backup your computer ? 4.Do you have enough Space ? 5.Download Service Pack 2 1. When Software agreement appears 6.Disconnect from your network 1. Unplug network card cable 2. Turn off Wireless 7.Turn off Anti Virus software 8.Install 9.Turn on Anti Virus 10.Reconnect to Network 11.If problems call 1-866- PC- Safety
13
Wireless What is wireless Wireless Networking Standards 802.11 a, b, and g 802.11 a, b, and g Recommend a standard “g” model Recommend a standard “g” model Wireless Security Standards Recommend Wired Equivalent Privacy (WEP) Recommend Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access (WPA)
14
Steps to protect your wireless network 1.Change the default password on your router 2. Enable WEP on router and wireless workstation 3.Use MAC address filtering 4.SSID broadcast of 5.Prohibit Peer-to-peer (Ad Hoc) networking 5. Keep current on hardware bios upgrades
15
Demo: How to configure Wireless Firewall/router Example: Basic Settings Basic Settings Wireless Settings Wireless Settings Backup Settings Backup Settings Set Account name and password Set Account name and password Blocking and Filtering Blocking and Filtering
16
Configuring Windows for Networking Print and File Sharing: Useful, but Useful, but Risky if not all computers are secure Risky if not all computers are secure
17
Weak Passwords Your computer password is the foundation of your computer security No Password = No Security No Password = No Security Old Passwords & Same Password = Little Security Change the “administrator” password on your computer
18
Questions
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.