Download presentation
Presentation is loading. Please wait.
Published byBeverly Dixon Modified over 8 years ago
1
CSC 116 Nov 9 2015
2
Administrative Required 2 nd exam will be next week on Wed Nov 18th It will be short (10 questions) It will only cover chapters 8 and 9 Network topics (we will review on Mon Nov 16th) It will count as a class project NO SCHOOL WED NOV 11 th
3
Today Firewalls Small Office/Home Office Router setup
4
Quick Review: OSI Model Picture Credit: blog.butchevans.com
5
Encapsulation Data
6
Quick review: IP Addresses Two Types IPv4: 32-bit addresses Use “Dotted-Decimal” ( 192.168.2.3) IPv6: 128-bit addresses Use hexadecimal ( 3ffe:1900:4545:1243:2001:f8ff:fe21:67cf)
7
Quick review: Transport Layer Transmission Control Protocol Reliable and connection-oriented User Datagram Protocol Unreliable and connectionless Both work with segments, use source and destination ports, and use checksums
8
Quick review: TCP and UDP
9
Firewalls can block network traffic Block incoming or outgoing network traffic based on rules Rules are usually based on IP addresses or ports Can be network-based or host-based Can be default-permit or default-deny
10
Windows firewall prompt
11
Barracuda Networks Firewall
12
Small Office/Home Office Router Image source: newegg.com
13
Setting up a SOHO router
14
SOHO router is many devices in one Router : routes traffic between local network and ISP network Switch: Allows multiple devices to be connected by connecting cables Wireless Access Point: Allows multiple devices to be connected over WiFi DHCP server: Assigns IP addresses to devices on the local network Firewall: Blocks certain traffic based on IP addresses and ports
15
Typical Setup Plug internet into WAN port, plug computers into LAN ports Configure router through web interface Usually something like 192.168.1.1 Consult your documentation It may ask for a username and password Consult your documentation Change the password to log in Change the WiFi SSID and password
16
WiFi Security Open – Might be ok in some situations WPA2 – Always use this if you can Hidden SSID – Adds some security by requiring people to type in the SSID before they can connect Provides weak security MAC Address filtereing – Allow only known physical devices to connect to your network Provides weak security
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.