Upgrade to Pro — share decks privately, control downloads, hide ads and more …

NETW191

Patluke Ragucci
December 17, 2022
440

 NETW191

Patluke Ragucci

December 17, 2022
Tweet

Transcript

  1. Introduction • Over the course of the last 8 weeks

    we covered a wide variety of topics and material regarding the Fundamentals of Information Technology and Networking. From the topology of different types of networks, to the security methods of said networks, and the different technologies associated with them. This is shown throughout this project presentation, where we tried our hands at network creation and management in a virtual environment.
  2. Challenges • Some challenges faced during this course were: •

    Learning the differences between similar security methods and technologies • Anlayzing what methods would work best for a given network type (i.e. basic vs complex) • Troubleshooting any connectivity issues or command errors.
  3. IPv4 Address Assignment This screenshot should include the Interfaces page

    that shows the new IPv4 address on the LAN interface.
  4. This screenshot should show the connectivity tests between the Computer

    1 VM and the other two devices (i.e., the SOHO Router VM and Computer 2 VM). Connectivity Test
  5. This screenshot should show the connectivity tests between the Computer

    2 VM and the other two devices (i.e., the SOHO Router VM and Computer 1 VM). Connectivity Test
  6. Rubric Activity Requirement(s) Points IP Subnetting Subnetting table 20 Loopback

    Interfaces Screenshot 20 Connectivity Tests Screenshot 20
  7. Subnet Subnet Notation Network Address First Usable Host Address Last

    Useable Host Address Broadcast Address The First Subnet 192.168.5.0/ 25 192.168.5.0 192.168.5.1 192.168.5.126 192.168.5.12 7 The Second Subnet 192.168.5.12 8/25 192.168.5.12 8 192.168.5.129 192.168.5.25 4 192.168.5.255 This table should include two /25 subnets, listing the subnet notation, network address, first usable host address, last usable host address, and broadcast address of each subnet. Subnetting Table
  8. This screenshot should show both Loopback1 and Loopback2 interfaces and

    their correct IPv4 addresses. Loopback Interfaces
  9. This screenshot should show two successful ping tests from the

    Computer 1 VM to the Loopback 1 and Loopback 2 interfaces. Connectivity Tests
  10. This diagram should illustrate the interconnection of the Computer 1

    VM, the Computer 2 VM, and the SOHO Router VM. Microsoft Visio Network Diagram
  11. 1. What are the factory default username and password of

    a TP-Link router? Why is it important to change the default username and password of a SOHO router? Answer: admin & admin. It’s important to change these because it’s extremely easy for a bad actor to simply guess this and gain admin level access to the router and thus the network. 2. To protect a SOHO wireless network with a small number of devices, which address management method provides more control, configuring the device IP addresses manually (static IP) or using a DHCP server (dynamic IP)? Why? Answer: For protecting a network and its devices, DHCP will always be the answer regardless of the size. This is because with DHCP the devices are automatically configured with fresh IP address as needed, and as these IPs are updated even if a bad actor was able to get the IP of one device, that IP won’t always be accurate. If the device has a static IP, then once it’s compromised it’s compromised until someone manually changes it. 3. What does MAC filtering do? If needed, when would you use deny filtering rules and when would you use allow filtering rules? What happens to devices that want to connect, if the “Allow the stations specified by any enabled entries in the list to access” function is enabled but there are no entries in the list? Answer: MAC filtering allows you to control the wireless stations that can access the AP based on their MACs. If an unknown and potentially malicious device was discovered on the network, and it’s MAC is visible, then you can use MAC filtering to deny that device access to the network’s AP. If no entries are on the list, then no wireless stations can access the AP. SOHO Wireless Network Security
  12. 1. What wireless security settings are displayed on the Wireless

    Security page? Which one is recommended by the vendor? Why? Answer: The options are for WPA-PSK or WPA2-PSK, with either AES or TKIP encryption, or WEP with a Hexadecimal Key Format. WPA2-PSK with AES encryption is recommended because enterprise authentication and TKIP encryption are not supported with WPS enabled. 2. Among the configurations you explored in this module, which one is a true security function? Why? Answer: WPA2, the WPA2 encryption protects data between wireless devices. 3. What would you do to protect your wireless network at home? Why? Answer: Change the network password from its default. Use WPA2 wireless encryption. Because I wouldn’t want my home network unsecure. SOHO Wireless Network Security
  13. Conclusion • Overall, this course was extremely informative and beneficial

    for setting the baseline foundation for follow-on networking courses to come.