Slide 1

Slide 1 text

NETW191 Final Project By Patluke C. Ragucci

Slide 2

Slide 2 text

Introduction • Over the course of the last 8 weeks we covered a wide variety of topics and material regarding the Fundamentals of Information Technology and Networking. From the topology of different types of networks, to the security methods of said networks, and the different technologies associated with them. This is shown throughout this project presentation, where we tried our hands at network creation and management in a virtual environment.

Slide 3

Slide 3 text

Challenges • Some challenges faced during this course were: • Learning the differences between similar security methods and technologies • Anlayzing what methods would work best for a given network type (i.e. basic vs complex) • Troubleshooting any connectivity issues or command errors.

Slide 4

Slide 4 text

NETW191 Course Project Module 2 IPv4 Addressing

Slide 5

Slide 5 text

Rubric Activity Requirement(s) Points Preparation Screenshot 15 IPv4 Address Assignment Screenshot 15

Slide 6

Slide 6 text

This screenshot should include the terminal window that shows the default gateway IP address. Preparation

Slide 7

Slide 7 text

IPv4 Address Assignment This screenshot should include the Interfaces page that shows the new IPv4 address on the LAN interface.

Slide 8

Slide 8 text

NETW191 Course Project Module 3 Connectivity Test

Slide 9

Slide 9 text

Rubric Activity Requirement(s) Points Dynamic IP Address Assignment Two Screenshots 30 Connectivity Test Two Screenshots 30

Slide 10

Slide 10 text

This screenshot should show the IPv4 address of the Computer 1 VM. Dynamic IP Address Assignment

Slide 11

Slide 11 text

This screenshot should show the IPv4 address of the Computer 2 VM. Dynamic IP Address Assignment

Slide 12

Slide 12 text

This screenshot should show the connectivity tests between the Computer 1 VM and the other two devices (i.e., the SOHO Router VM and Computer 2 VM). Connectivity Test

Slide 13

Slide 13 text

This screenshot should show the connectivity tests between the Computer 2 VM and the other two devices (i.e., the SOHO Router VM and Computer 1 VM). Connectivity Test

Slide 14

Slide 14 text

NETW191 Course Project Module 4 IP Subnetting and Loopback Interfaces

Slide 15

Slide 15 text

Rubric Activity Requirement(s) Points IP Subnetting Subnetting table 20 Loopback Interfaces Screenshot 20 Connectivity Tests Screenshot 20

Slide 16

Slide 16 text

Subnet Subnet Notation Network Address First Usable Host Address Last Useable Host Address Broadcast Address The First Subnet 192.168.5.0/ 25 192.168.5.0 192.168.5.1 192.168.5.126 192.168.5.12 7 The Second Subnet 192.168.5.12 8/25 192.168.5.12 8 192.168.5.129 192.168.5.25 4 192.168.5.255 This table should include two /25 subnets, listing the subnet notation, network address, first usable host address, last usable host address, and broadcast address of each subnet. Subnetting Table

Slide 17

Slide 17 text

This screenshot should show both Loopback1 and Loopback2 interfaces and their correct IPv4 addresses. Loopback Interfaces

Slide 18

Slide 18 text

This screenshot should show two successful ping tests from the Computer 1 VM to the Loopback 1 and Loopback 2 interfaces. Connectivity Tests

Slide 19

Slide 19 text

NETW191 Course Project Module 5 Visio Network Diagram

Slide 20

Slide 20 text

Rubric Activity Requirement(s) Points Microsoft Visio Network Diagram Screenshot 60

Slide 21

Slide 21 text

This diagram should illustrate the interconnection of the Computer 1 VM, the Computer 2 VM, and the SOHO Router VM. Microsoft Visio Network Diagram

Slide 22

Slide 22 text

NETW191 Course Project Module 6 SOHO Wireless Network Security

Slide 23

Slide 23 text

Rubric Activity Requirement(s) Points SOHO Wireless Network Security Six Questions 60

Slide 24

Slide 24 text

1. What are the factory default username and password of a TP-Link router? Why is it important to change the default username and password of a SOHO router? Answer: admin & admin. It’s important to change these because it’s extremely easy for a bad actor to simply guess this and gain admin level access to the router and thus the network. 2. To protect a SOHO wireless network with a small number of devices, which address management method provides more control, configuring the device IP addresses manually (static IP) or using a DHCP server (dynamic IP)? Why? Answer: For protecting a network and its devices, DHCP will always be the answer regardless of the size. This is because with DHCP the devices are automatically configured with fresh IP address as needed, and as these IPs are updated even if a bad actor was able to get the IP of one device, that IP won’t always be accurate. If the device has a static IP, then once it’s compromised it’s compromised until someone manually changes it. 3. What does MAC filtering do? If needed, when would you use deny filtering rules and when would you use allow filtering rules? What happens to devices that want to connect, if the “Allow the stations specified by any enabled entries in the list to access” function is enabled but there are no entries in the list? Answer: MAC filtering allows you to control the wireless stations that can access the AP based on their MACs. If an unknown and potentially malicious device was discovered on the network, and it’s MAC is visible, then you can use MAC filtering to deny that device access to the network’s AP. If no entries are on the list, then no wireless stations can access the AP. SOHO Wireless Network Security

Slide 25

Slide 25 text

1. What wireless security settings are displayed on the Wireless Security page? Which one is recommended by the vendor? Why? Answer: The options are for WPA-PSK or WPA2-PSK, with either AES or TKIP encryption, or WEP with a Hexadecimal Key Format. WPA2-PSK with AES encryption is recommended because enterprise authentication and TKIP encryption are not supported with WPS enabled. 2. Among the configurations you explored in this module, which one is a true security function? Why? Answer: WPA2, the WPA2 encryption protects data between wireless devices. 3. What would you do to protect your wireless network at home? Why? Answer: Change the network password from its default. Use WPA2 wireless encryption. Because I wouldn’t want my home network unsecure. SOHO Wireless Network Security

Slide 26

Slide 26 text

Conclusion • Overall, this course was extremely informative and beneficial for setting the baseline foundation for follow-on networking courses to come.