Lswn Assignment Individual APU (A+ ^^)

download Lswn Assignment Individual APU (A+ ^^)

of 46

description

Hope will help u up =)

Transcript of Lswn Assignment Individual APU (A+ ^^)

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    1/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 1

    LAN Switching and WAN Networks

    (CT032-3.5-2)

    Individual Assignment

    Student Name Leim Jing Jie (TP025470)

    Intake Code UC2F1310IT (NC)

    Hand-out Date 7 January 2014

    Hand-in Date 28t

    February 2014

    Lecturer Mr. Qusay Sabah Ishaq

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    2/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 2

    Assignment Component

    (100%):Weightage Marks

    Documentation 15 %

    Overall Tasks performed 60 %

    Citations and referencing 15 %

    Reflection 10 %

    TOTAL 100 % /100

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    3/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 3

    Table of ContentsNecessary Equipment and Software ............................................................................................................. 5

    Steps to establish the internet connection ................................................................................................... 9

    Router configuration ................................................................................................................................... 10

    Web-based Configuration Utility ............................................................................................................ 10

    Internet Setup ......................................................................................................................................... 12

    Internet connection setup wizard ....................................................................................................... 12

    Manual Wireless Connection Setup .................................................................................................... 16

    Wireless Setup ........................................................................................................................................ 18

    Wireless Connection Setup Wizard ..................................................................................................... 18

    Manual Wireless Connection Setup .................................................................................................... 20

    Multiple Wireless Network Name Setup ............................................................................................ 21

    LAN Setup ................................................................................................................................................ 22

    Time and Date ......................................................................................................................................... 23

    Parental Control ...................................................................................................................................... 24

    Advanced wireless .................................................................................................................................. 25

    Advanced Network.................................................................................................................................. 26

    Routing .................................................................................................................................................... 27

    Device administrator ............................................................................................................................... 27

    Save and Restore .................................................................................................................................... 28

    DDNS setting ........................................................................................................................................... 28

    System Check .......................................................................................................................................... 29

    Configuring the users device to receive the internet connection ............................................................. 30

    Wired connection.................................................................................................................................... 30

    Wireless connection ................................................................................................................................ 30

    Security Features ......................................................................................................................................... 32

    Change default Wi-Fi router password ................................................................................................... 32

    Change and Hide SSID Name ................................................................................................................. 33

    Change Wi-Fi Security Key .................................................................................................................... 33

    Mac Filter ................................................................................................................................................ 34

    WEP wireless security ............................................................................................................................. 34

    WPA/WPA 2 Wireless Security ............................................................................................................... 35

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    4/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 4

    Enable Firewall ........................................................................................................................................ 36

    Limit the router IP address Pool ............................................................................................................. 37

    Port forwarding Concept and Application .................................................................................................. 38

    Implementation of port forwarding........................................................................................................ 39

    Reference .................................................................................................................................................... 42

    Works Cited ................................................................................................................................................ 43

    Figure List .................................................................................................................................................... 45

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    5/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 5

    Necessary Equipment and Software

    The equipment needed for the internet connection implementation is a modem, router, fiber optic

    cable, CAT 5 UTP cable and a network card.

    Figure 1 Overview of the internet flow

    Figure 2 Modem (Huawei Echolife HG850a GPON Terminal)

    A modem is equipment that is used to transmit and receive the data between your computer and

    your internet service provider. All the binary code data from the computer is converted into

    analogue signal and is travels over the destination via telephone or cable line. When the data

    reach the destination, the modem will convert the analogue signal back to binary coded data, and

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    6/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 6

    the data is now readable by the computer. In a simpler definition, a modem is a device that

    converts the analog signal into data or vice versa.

    Figure 3 Dlink Router (TM, 2013)

    The router is a device that forwards the packet data in the computer networks. This device

    normally is connected to at least 2 networks. It is located at the gateways, the place where 2 or

    more networks are connected. (Elizabeth, 2010)

    By using the modem and router, the user will able to supplies internet and transmit the internet

    signal connection to different users in the home. The user can use their wireless devices likelaptops, tablet or PC to use the signal and get the ability to access to internet. This device can be

    used as hardware firewall and provide better protection to the user against the hacking than the

    software firewall. Moreover, it unlike software firewall, will consume computer resources.

    (Christina, 2010)

    A wireless adapter is needed to get the internet connection. It adds the wireless connectivity to a

    laptop or desktop. It can be in the form of USB or card formats. (Ben, 2010)

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    7/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 7

    Figure 4 Cat 5 UTP cable (Alan, 2010)

    Cat 5 UTP cable is used to allow the transmission of internet connection between routers to the

    end user devices or modem to router. This kind of cable can support 10/100 Mbps Ethernet

    network.

    Figure 5 Fiber Optic (James, 2010)

    Fiber optic cable is containing bundle of glass threads, which capable to transmit the messagemodulated onto light wave. It carries more data and can have a greater bandwidth. It is used as

    the data transfer medium from the internet service provider to the internet subscriber home.

    (Cecilia, 2009)

    There are some software needed to implement the internet connection for the home, which arefirmware, web browser and Ubuntu operating system. Every routers is containing a built-in

    programmable logic called firmware. It is used to implement the networks and security for the

    router. Every brand firmware come with different graphical user interface, and user can use the

    features of the routers once they enter the login information of the router. (John, 2010)

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    8/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 8

    Before started to set up the internet connection, the user should have a web browser in the

    computer, else they will unable to surf the internet. The Ubuntu Operating system has a default

    web browser, which is Mozilla Fire Fox and it can be used for configuration. The users also can

    install or have others updated Java-enabled web browser in the market to do the configuration of

    the router. The table below shows the recommendation of web browser that can be used: Without

    an updated Java-enabled web browser, the user might cant access to the web-based configuration

    utility.

    Internet Explorer 6.0 or higher Camino 0.8.4 or higher

    Netscape 8 or higher Firefox 1.5 or higher

    Mozilla 1.7.12 (5.0) or higher

    Opera 8.5 or higherSafari 1.2 or higher (with Java 1.3.1 or higher)

    The computers that are used must come with an operating system, Windows, Macintosh or

    Ubuntu. In this project, all the users devices must come with Ubuntu operating system.

    Without the operating system, web browser and the modem router stated above, configurations

    of network will not success.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    9/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 9

    Steps to establish the internet connection

    The user should make sure that all the cable is connected properly at the correct port. Without

    proper port connection and configuration, the user will not able to connect to internet. Sometime

    the power adapter is loosening or the router is turned off. The users have to ensure that the power

    strips is connected into the outlet and the power adapter is on to ensure the router is able to

    receive electricity supply. Moreover, the users have to make sure that the LAN Cable and

    Ethernet cable are firmly seated in the port provided in the router. A clicking sound should be

    provided when the cable is snapping into the position. (Elizabeth, 2013)

    CAT 5 UTP cable

    After the devices are setup and the cables are connected, the user can start to configure the router.

    Port that for the Optical

    Fiber Cable from TM

    (Internet service provider)

    LAN port of the modem should connected to the

    internet port of the router by using CAT Cable

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    10/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 10

    Router configuration

    Web-based Configuration Utility

    Heres I will show the way to configure the Dlink dir 615 wireless router.

    Figure 6 Enter IP address in Web browser

    Firstly, the user should open any of the web browser stated above to access the configuration

    utility. After that, the user should enter the IP address of the router and the user will be directed

    to the routers configuration page. In default, most of the router IP address will be 192.168.0.1,

    192.168.1.1 or 192.168.2.1.

    Figure 7 Figure out own IP address

    In Ubuntu, the user can also figure out their IP address by opening the terminal and enter route.

    The user can open the terminal by pressing ctrl+alt+T. The gateway of the router will be shown

    in the terminal, which is 192.168.0.1.

    Figure 8 Router firmware login page

    For default setting of the router, the user has to type admin and left the password field blank.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    11/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 11

    If the user forgotten the password, the user must click reset button of the router. All the settings

    of the router will change back to the factory defaults. The default IP address is 192.168.0.1 and

    the user name is admin and leaves the password blank.

    If the user are not directed to the page below and get a Page Cannot be displayed error. The users

    have the check few things.

    Check whether their Java-enabled web browser is updated and reach the requirement asstated above or not.

    The user should check whether WAN and WLAN solid light of the router. If the light isnot working, the user should try to use other cable or connect to a different port of the

    devices.

    This problem might causes by the internet security software. All these software mayblock the access to the router configuration page. The user is advised to disabled the

    internet security software that running in the devices if the user face the problem above.

    If all the user still facing the problem after check all the thing above, the user should tryto switch off the router for 10 seconds and on back. After 30 seconds past, the user

    should try to access to the router configuration utility.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    12/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 12

    Internet Setup

    Figure 9 Internet Setup

    If the user success login, it will be directed to the page above. The setup wizard is used to set up

    the router. To execute it, the user is required to click the Internet Connection Setup Wizard

    button and the first page of wizard set up will be displayed. (TM, 2010)

    Internet connection setup wizard

    Figure 10 Internet connection Setup wizard Confirmation page

    The user should click next to proceed to next step.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    13/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 13

    Figure 11 Internet Connection Setup Wizard Step 1

    After user defined password is entered, the user should click next to continue.

    The user can choose their desired internet connection type, which are dynamic IP address or

    static IP address.

    Dynamic IP address Static IP

    Figure 12Dynamic IP address Figure 13 Static IP addressIf dynamic IP address mode is chosen, the user are

    required to fill in the username, password and verify

    password text box. For service name, the user can

    leave it blank.

    For static IP, the user are required to fill all the

    text field that entered by the user who chosen

    dynamic IP address. Other than that, the user i

    also required to enter the IP address and its

    subnet mask in the field provided. Moreover,

    LAN starts IP and end IP should be filled in

    also.

    (TM, 2010)

    After all the required information is entered, the user is required to click next to proceed to next

    stage.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    14/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 14

    Figure 14 Reboot device or run the wireless connection setup wizard

    The router will be rebooting if the button is clicked. A button is prepared for those users who

    want to open the wizard window of configuring wireless connection.

    Reboot

    Figure 15Reboot

    All the settings set by

    the user will be savedand the device is

    rebooting.

    When the rebooting

    process is ended, a new

    opening window will be

    displayed in the

    monitor.

    Wireless Connection Setup Wizard

    Figure 16 Wireless Connection Setup Wizard

    This window is

    displayed when the user

    click the wireless

    connection setup wizard

    button.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    15/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 15

    Figure 17 Setup your wireless network

    Users are required to enter their favorable SSID name in the text box provided. The users are

    recommended to choose option 1, which are automatically assign network key over option 2.

    Moreover, user can use the check box to enable or disable the wireless security function of the

    router and then the next button is click to continue.

    For those users who select to manually assign a network key, they will be directed to the page

    above. The system will prompt the user to enter the network key and click next after this

    operation is ended.

    Figure 18Setup Complete

    This window will display all the information of the router. Users are recommended to print

    screen or print this information out, because it is important information of the router. When save

    button is pressed, the router will automatically save the settings of the routers and reboot process

    began. The process will take around 1-2 minutes. When this process is ended, the wireless setup

    window is displayed.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    16/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 16

    Manual Wireless Connection Setup

    If the user wanted to manually configure the wireless Internet, he or she should click the manual

    wireless connection setup button. (TM, 2010)

    Same with the internet connection setup wizard, the user have to choose to create a dynamicPPPoE or a static PPPoe.

    Dynamic PPPoE

    Figure 19Dynamic PPPoEIf the user plans to create dynamic PPPoE, he or she should click the (Dynamic PPPoE) radio

    button.

    After that, the users are required to enter the username, password, confirm password, DNS,

    maximum idle time and MTU. Its optional for the user to enter the service name.

    After all the information needed is entered, the users should click the save settings.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    17/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 17

    If the user plans to create static PPPoe, he or she should click the (Static PPPoE) radio button.

    Figure 20 Static PPPoEThe user have to enter all the information inside the text field, he or she should click the save

    setting button.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    18/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 18

    Wireless Setup

    The user can choose to configured the wireless settings manually or by using wizard. The

    wireless connection setup wizard button is clicked if the user wanted to use wizard. To configure

    this manually, the user should click the manual wireless connection setup. (TM, 2010)

    Wireless Connection Setup Wizard

    Figure 21 Wireless Connection Setup Wizard

    Click next to proceed to next stage.

    Figure 22 Setup wireless Network

    The user is required to enter their desired wireless network name, also called as SSID.

    The user should choose either automatically assign a network key or manually assign a network

    key for the wireless security key. The user has the enable or disable the wireless security and

    click Next to continue.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    19/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 19

    Figure 23Set up wireless security password

    If the user has chosen manually assign a network key, it will direct the user to a window that

    prompt the user to enter a wireless security password in the text field provided. Click next to

    continue.

    Figure 24Setup complete

    After that, all the new setting chosen by the user will be saved and the router will reboot. The

    reboot process takes 1-2 minutes. After this process is end, the opening wireless setup window is

    displayed.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    20/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 20

    Figure 25Rebooting

    The information of wireless security setting is displayed in the window. The users are

    recommended to print or save the information up and then click Save to continue.

    Manual Wireless Connection Setup

    Figure 26 Manual Wireless connection setup

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    21/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 21

    At this page, the user can use the Wi-Fi protection features by ticking the enable check box. If

    all the users are using wired connection, they can uncheck the box to disable the wireless

    function. The user can enable the wireless channel selection for the router and change the

    default wireless channel to their desired want. The user also can enable WMM in this page. By

    enabling it, WWM assign the priority to the traffic of voice, video, best effort and background.

    (TM, 2010)

    Multiple Wireless Network Name Setup

    Figure 27Wireless Network Name Setup

    The user can create new SSID in this page by entering the required data in the space provided.

    The user also can choose the SSID by ticking the check box.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    22/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 22

    LAN Setup

    Figure 28LAN Setup

    In this page, the user can change the local network settings of the router. The user is required to

    enter the router IP address, default subnet mask and local domain name. The user has the abilityto enable or disable the DNS relay. (TM, 2010)

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    23/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 23

    Time and Date

    Figure 29Time and Date

    In this page, the user can configure, update and maintain the time on the system clock. The user

    can manually set the time and date. They also can get the accurate time and date by selecting

    time zone.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    24/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 24

    Parental Control

    Figure 30Parental Control

    This functionality in the router allows the user to allow or deny the users from accessing certain

    website. The user can configure parental control here. They can choose to turn off this feature, or

    turn on this feature and deny the devices of the network from accessing the website listed in

    website URL. After the website URL is entered in the space provided, the user will be blocked

    from accessing the website. (TM, 2010)

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    25/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 25

    Advanced wireless

    Figure 31Advanced Wireless

    In this section, the user are allowed to change the wireless radio setting, such as transmit power,

    beacon interval, RTS threshold, fragmentation, DTIM interval, preamble type, CTS mode, etc.

    The user can configure mac filter features in this window. There are 3 option for configure mac

    filter, option 1 is turn it off, option 2 is turn mac filtering on and allow computer listed to access

    the network and option 3 is turn mac filtering on and deny computers listed to access the network.

    If the user wanted to choose option 2 and allow him/her to access to network only but

    accidentally chosen option 3. Then the user might face difficulty to join the network. If some

    new devices having difficulty to join the network, check the router to check whether this mac

    address filtering function is in off condition or the MAC address of the devices is inserted in

    the list of allowed connection. (Angela, 2010)

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    26/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 26

    Advanced Network

    Figure 32Advanced Network

    In this window, the user can change the LAN setting. The user also can enable multicast streams,

    wireless enhance mode and Universal plug and play for the network device. The user also can setthe WAN port speed. (TM, 2010)

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    27/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 27

    Routing

    Figure 33Routing

    This window allows the user to define the routes and defined destinations.

    Device administrator

    Figure 34Device administrator

    In this page, the user can change the admin password. The user also can enable or disable the

    functionality of remote management.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    28/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 28

    Save and Restore

    Figure 35Save and Restore

    In this page, the user can save and load the configuration file to and from the computer.

    Moreover, the user also can restore the routers factory default settings.

    DDNS setting

    Figure 36DDNS Setting

    You can configure the DDNS setting at this page. You can choose to enable or disable this

    service. The user is required to choose the service address and enter the host name, username and

    password.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    29/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 29

    System Check

    Figure 37System Check

    The physical connectivity of the LAN and WAN is shown in this page. The status of internet will

    be shown in this page.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    30/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 30

    Configuring the users device to receive the internet connection

    Figure 38Internet connection of Ubuntu

    The photo above shows the internet connection icon of Ubuntu Operating system, which are can

    be easily found at the top of the devices. The device is currently not connected to network. To

    access to the internet, the user are required to enable networking. After that, the user can add a

    wired or wireless connection for the devices at the edit connection function.

    Wired connection

    In this project, 2 users would like to have a wired connection and another 2 users prefer a

    wireless connection. To have a wired connection, the user is required to plug the CAT 5 UTP

    cable from the router to their devices. After that, Ubuntu will identify all the important settings

    of the router and the device will have wired internet connection.

    Wireless connection

    Figure 39Edit wireless connection (SSID) Figure 40 Edit wireless connection (password)

    To have a wireless internet connection in the device, the user can either scan for the broadcast

    wireless SSID or manually enter the SSID name (if it is not being broadcasted or hidden).

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    31/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 31

    Figure 41Edit wireless connection (Save connection)

    After that, the user is required to enter the password for the network in the space provided. When

    save button is clicked, the device is now able to access to internet.

    Figure 42Wired

    connection

    When the device is connected via wired connection, this icon will be

    appeared.

    Figure 43Wireless

    connection

    When the device is connected via wireless connection, this icon will be

    appeared.

    For those user connect internet via wireless connection, the might face some problem, which are

    the network will not reach certain areas. In the home, the wireless signal transmitted might not

    able to fulfil all users need. There are certain part of the home is a wireless dead zone, where

    wireless connection not working there. Bedroom, study room or a porch is a common dead zone

    area. Dead zone is occurred when something interfered the Wi-Fi signal. This can be solved by

    reposition the router, set up a wireless repeater or uses a wired connection. An Ethernet cable

    from the router can be drag into the dead zone. (Marinda, 2010)

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    32/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 32

    Security Features

    Security is vital for internet connection. If there is no security features in the wireless connection,

    the authorized user might access your wireless LAN from nearby location and perform some

    illegal activities. (Marcus, 2009)Few things are needed to do in order to ensure the security of the

    internet connection.

    Change default Wi-Fi router password

    Figure 44 default Wi-Fi router password

    Figure 45 Change password

    First, the users have to change the default Wi-Fi router from the service provider. My service

    provider is TM. The table below shows the default password for the router of the company. To

    prevent unauthorized user from using our internet, we should change and configure the router

    password at maintenance tab.

    Username PasswordAdmin (Blank)

    Admin Admin

    Operator Telekom

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    33/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 33

    Change and Hide SSID Name

    Figure 46SSID Name

    Figure 47Enable / disable hidden SSID

    By default, all SSID name is end with @Unifi. When your neighbor saw that name, they will

    know this is the default setting of the internet connection. They might play around with it or

    might find ways to crack or try to access to the network using the default username and password

    mention above. If the user does not want others to know the SSID name of this device, he or she

    can enable the hidden wireless in wireless setup page. The users are required to know the SSID

    name of the devices in order to join the network.

    Change Wi-Fi Security Key

    By default, if the internet connection is not configured, password is not required to use the

    internet, or if configured, it usually used password that can easily cracked by others. The user

    should enable the WEP and WPA/WPA2 function in the router and enter your preferable

    alphanumeric password in the space given. The WEP and WPA/WPA2 security protocol can

    ensure that your wireless LAN is secured and it would be hard for the unauthorized user to hack

    or sniff the wireless LAN.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    34/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 34

    Mac Filter

    Figure 48Mac Filter

    Every device has a MAC address alphanumeric string MAC address which is unique. You can

    protect your network by preventing the unwanted devices from joining your network. In this

    project there are only 4 users. While configuring the router, the user use this features to only

    enable the 4 users devices to use the network only. If the authorized user devices MAC address

    of 00:02:D1:1A:2D:12 is at the MAC address blocking table, even the user know the password

    for the wireless LAN, he or she would not able to join the network. (Teddy, 2011)

    WEP wireless security

    Figure 49WEP wireless security

    To use the WEP security, the user should choose it from the security mode. After that, the user

    are required to select the authentication method, WEP Encryption and the default WEP key and

    the WEP key value. After that, save button is clicked to save the changes you made.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    35/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 35

    WPA/WPA 2 Wireless Security

    PSK

    Figure 50WPA/WPA2 (PSK)

    EAP

    Figure 51WPA/WPA2 (EAP)

    After this wireless security is enabled, the user

    is required to choose cipher type. If PSK is

    chosen, the user is required to enter network

    key. The user can enter an alphanumeric

    password which with minimum character of 8

    and maximum character of 63.

    After the process is done, the user should click

    save settings.

    The user should choose the Cipher type from

    the drop down box. If EAP is chosen, the user

    is required to enter the Radius server IP

    address, the port and the shared secret. Save

    settings button is clicked to save the settings.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    36/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 36

    Enable Firewall

    Figure 52Enable firewall

    At the default setting for router, the firewall was disabled. In order to get protection of the

    firewall, the user should enable the firewall features by ticking the Enable WAN to LAN

    Firewall keyword in the Advance tab. Moreover, the user should also enable the security features

    like DOS Attack, Scan Attack and service filter in the router. All these will ensure the best

    defense for the router to against the security threat. (CISCO, 2010)

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    37/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 37

    Limit the router IP address Pool

    The devices that join the network can be identified using IP address. This router comes with a

    built-in DHCP server. The DHCP server will assign 1 IP address to the device when it joins the

    network. By limiting the IP addresses of your router, the lesser the chance for the unauthorized

    user from accessing the network. If the user for the wireless LAN is less, you can set a range of

    DHCP IP address from 192.168.0.1 to 192.168.0.10. It only allows 10 devices on using the

    network. The photo below shows the steps of limiting the router IP address Pool.

    Figure 53Limit router IP address pool

    The user can choose to disable or enable the server. The user can set the IP address range for the

    router. They can also add the clients of DHCP by entering the computer name, IP address, and

    Mac address of the devices.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    38/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 38

    Port forwarding Concept and Application

    Port forwarding also called as port mapping. It is a useful method to preserve public IP addresses,

    protect the servers and clients from unwanted access. The services and servers of the network can be

    hided using port forwarding. Port number is used to identified the services. For example web traffic uses

    port number 80. If you host a Web server in your home that is accessible on the public internet, the port

    forwarding panel in the router will configured to direct Web packet of port 80 to IP address of the Web

    server in your home. Moreover, port forwarding can limit the access to and from a network. Port

    forwarding is important. It can be used to keep unwanted traffic off the networks.Invalid source

    specified.

    The diagram above shows the process of port forwarding, which allows the users from accessing theweb server from anywhere using internet. Port forwarding allow the users to open and choose the range

    of port number that they would like for the user of certain IP address for some application incoming and

    outgoing traffic activity.

    Internet

    Open Incoming Port 80

    Direct Port 80 traffic to IP address of Web Server

    Web Server

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    39/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 39

    Implementation of port forwarding

    Firstly, the routers IP address is entered into the address bar of the web browser of the users.

    Secondly, the users are required to enter their username and password for the router. If you have

    forgotten your username and password for the router, you can click the reset button to reset it

    back to factory defaults. After that, you can search for the factory default setting login

    information online.

    Figure 54Port forwarding

    Thirdly, the user should find the port forwarding section. For Unifi users router, the port

    forwarding function can be found in advanced settings.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    40/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 40

    Figure 55Port forwarding (Choose computer name)

    Fourthly, the user can create their entry at the space given. The user has to enter the name for theservice. The user is suggested to enter the name which related to the program. After that, the user

    is required to enter their IP address. Moreover, the user are required to choose the application

    name and their computer from the drop down bar. The service type of the router would be TCP,

    UDP or TCP&UDP. The user should choose the service type and the port that they wish to use.

    Figure 56Port forwarding (Computer name)

    If the user wants to open one port for Doom 3 (Application Name), they should enter the same

    number in the start and end. In case the user decided to open 5 ranges for the port, it might start

    with 1234 and end with 1238.

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    41/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 41

    After u done all the operation of port forwarding, you are required to click save settings. The

    router will restart to take effect. (John, 2010)

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    42/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 42

    Gantt chart

    Figure 57 Gantt chart

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    43/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 43

    Reference

    Works Cited

    Alan, 2010. cat5. [Online] Available at:http://www.lanlink.co.za/wp-

    content/uploads/2012/04/Cat51.jpg[Accessed 20 February 2014].

    Angela, 2010. troubleshooting home router. [Online] Available at:o

    http://compnetworking.about.com/od/homenetworktroubleshooting/a/troubleshooting-home-

    network-routers.htm[Accessed 20 February 2014].

    Ben, 2010. wirelessgear. [Online] Available at:

    http://compnetworking.about.com/od/wireless/ss/wirelessgear_3.htm[Accessed 20 February 2014].

    Cecilia, 2009.fiber optic. [Online] Available at:http://www.webopedia.com/TERM/F/fiber_optics.html

    [Accessed 20 February 2014].

    Christina, 2010. Router. [Online] Available at:http://searchnetworking.techtarget.com/definition/router

    [Accessed 20 February 2014].

    CISCO, 2010. Cisco. [Online] Available at:

    http://www.cisco.com/web/solutions/smb/products/routers_switches/800_series_integrated_services_

    routers/integrated_security_in_router.html[Accessed 20 February 2014].

    Elizabeth, 2010. router. [Online] Available at:http://www.webopedia.com/TERM/R/router.html

    [Accessed 20 February 2014].

    Elizabeth, 2013. troubleshooting home network. [Online] Available at:

    http://compnetworking.about.com/od/homenetworktroubleshooting/a/troubleshooting-home-

    network-routers.htm[Accessed 20 February 2014].

    James, 2010.fibre optic. [Online] Available at:

    https://www.google.com/search?q=fibre+optic&espv=210&es_sm=93&tbm=isch&source=lnms&sa=X&

    ei=VPcPU72uLojr0wHV5oCoCg&ved=0CAcQ_AUoAQ&biw=1024&bih=481#facrc=_&imgdii=_&imgrc=1p

    yH29zh1RJZtM%253A%3BPf2IwszhPJZESM%3Bhttp%253A%252F%252Fwww.twlvoiceanddata.co.uk%2

    [Accessed 28 February 2014].

    John, 2010. computernetworking. [Online] Available at:http://compnetworking.about.com/od/wifihomenetworking/qt/firmwareupgrade.htm[Accessed 20

    February 2014].

    John, 2010. set up port forwarding on a router. [Online] Available at:http://www.wikihow.com/Set-Up-

    Port-Forwarding-on-a-Router[Accessed 20 February 2014].

    http://www.lanlink.co.za/wp-content/uploads/2012/04/Cat51.jpghttp://www.lanlink.co.za/wp-content/uploads/2012/04/Cat51.jpghttp://www.lanlink.co.za/wp-content/uploads/2012/04/Cat51.jpghttp://www.lanlink.co.za/wp-content/uploads/2012/04/Cat51.jpghttp://compnetworking.about.com/od/wireless/ss/wirelessgear_3.htmhttp://compnetworking.about.com/od/wireless/ss/wirelessgear_3.htmhttp://www.webopedia.com/TERM/F/fiber_optics.htmlhttp://www.webopedia.com/TERM/F/fiber_optics.htmlhttp://www.webopedia.com/TERM/F/fiber_optics.htmlhttp://searchnetworking.techtarget.com/definition/routerhttp://searchnetworking.techtarget.com/definition/routerhttp://searchnetworking.techtarget.com/definition/routerhttp://www.cisco.com/web/solutions/smb/products/routers_switches/800_series_integrated_services_routers/integrated_security_in_router.htmlhttp://www.cisco.com/web/solutions/smb/products/routers_switches/800_series_integrated_services_routers/integrated_security_in_router.htmlhttp://www.cisco.com/web/solutions/smb/products/routers_switches/800_series_integrated_services_routers/integrated_security_in_router.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://compnetworking.about.com/od/homenetworktroubleshooting/a/troubleshooting-home-network-routers.htmhttp://compnetworking.about.com/od/homenetworktroubleshooting/a/troubleshooting-home-network-routers.htmhttp://compnetworking.about.com/od/homenetworktroubleshooting/a/troubleshooting-home-network-routers.htmhttps://www.google.com/search?q=fibre+optic&espv=210&es_sm=93&tbm=isch&source=lnms&sa=X&ei=VPcPU72uLojr0wHV5oCoCg&ved=0CAcQ_AUoAQ&biw=1024&bih=481#facrc=_&imgdii=_&imgrc=1pyH29zh1RJZtM%253A%3BPf2IwszhPJZESM%3Bhttp%253A%252F%252Fwww.twlvoiceanddata.co.uk%2https://www.google.com/search?q=fibre+optic&espv=210&es_sm=93&tbm=isch&source=lnms&sa=X&ei=VPcPU72uLojr0wHV5oCoCg&ved=0CAcQ_AUoAQ&biw=1024&bih=481#facrc=_&imgdii=_&imgrc=1pyH29zh1RJZtM%253A%3BPf2IwszhPJZESM%3Bhttp%253A%252F%252Fwww.twlvoiceanddata.co.uk%2https://www.google.com/search?q=fibre+optic&espv=210&es_sm=93&tbm=isch&source=lnms&sa=X&ei=VPcPU72uLojr0wHV5oCoCg&ved=0CAcQ_AUoAQ&biw=1024&bih=481#facrc=_&imgdii=_&imgrc=1pyH29zh1RJZtM%253A%3BPf2IwszhPJZESM%3Bhttp%253A%252F%252Fwww.twlvoiceanddata.co.uk%2https://www.google.com/search?q=fibre+optic&espv=210&es_sm=93&tbm=isch&source=lnms&sa=X&ei=VPcPU72uLojr0wHV5oCoCg&ved=0CAcQ_AUoAQ&biw=1024&bih=481#facrc=_&imgdii=_&imgrc=1pyH29zh1RJZtM%253A%3BPf2IwszhPJZESM%3Bhttp%253A%252F%252Fwww.twlvoiceanddata.co.uk%2http://compnetworking.about.com/od/wifihomenetworking/qt/firmwareupgrade.htmhttp://compnetworking.about.com/od/wifihomenetworking/qt/firmwareupgrade.htmhttp://www.wikihow.com/Set-Up-Port-Forwarding-on-a-Routerhttp://www.wikihow.com/Set-Up-Port-Forwarding-on-a-Routerhttp://www.wikihow.com/Set-Up-Port-Forwarding-on-a-Routerhttp://www.wikihow.com/Set-Up-Port-Forwarding-on-a-Routerhttp://www.wikihow.com/Set-Up-Port-Forwarding-on-a-Routerhttp://www.wikihow.com/Set-Up-Port-Forwarding-on-a-Routerhttp://compnetworking.about.com/od/wifihomenetworking/qt/firmwareupgrade.htmhttps://www.google.com/search?q=fibre+optic&espv=210&es_sm=93&tbm=isch&source=lnms&sa=X&ei=VPcPU72uLojr0wHV5oCoCg&ved=0CAcQ_AUoAQ&biw=1024&bih=481#facrc=_&imgdii=_&imgrc=1pyH29zh1RJZtM%253A%3BPf2IwszhPJZESM%3Bhttp%253A%252F%252Fwww.twlvoiceanddata.co.uk%2https://www.google.com/search?q=fibre+optic&espv=210&es_sm=93&tbm=isch&source=lnms&sa=X&ei=VPcPU72uLojr0wHV5oCoCg&ved=0CAcQ_AUoAQ&biw=1024&bih=481#facrc=_&imgdii=_&imgrc=1pyH29zh1RJZtM%253A%3BPf2IwszhPJZESM%3Bhttp%253A%252F%252Fwww.twlvoiceanddata.co.uk%2https://www.google.com/search?q=fibre+optic&espv=210&es_sm=93&tbm=isch&source=lnms&sa=X&ei=VPcPU72uLojr0wHV5oCoCg&ved=0CAcQ_AUoAQ&biw=1024&bih=481#facrc=_&imgdii=_&imgrc=1pyH29zh1RJZtM%253A%3BPf2IwszhPJZESM%3Bhttp%253A%252F%252Fwww.twlvoiceanddata.co.uk%2http://compnetworking.about.com/od/homenetworktroubleshooting/a/troubleshooting-home-network-routers.htmhttp://compnetworking.about.com/od/homenetworktroubleshooting/a/troubleshooting-home-network-routers.htmhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.cisco.com/web/solutions/smb/products/routers_switches/800_series_integrated_services_routers/integrated_security_in_router.htmlhttp://www.cisco.com/web/solutions/smb/products/routers_switches/800_series_integrated_services_routers/integrated_security_in_router.htmlhttp://searchnetworking.techtarget.com/definition/routerhttp://www.webopedia.com/TERM/F/fiber_optics.htmlhttp://compnetworking.about.com/od/wireless/ss/wirelessgear_3.htmhttp://www.lanlink.co.za/wp-content/uploads/2012/04/Cat51.jpghttp://www.lanlink.co.za/wp-content/uploads/2012/04/Cat51.jpg
  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    44/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 44

    Marcus, 2009. wireless Lan security. [Online] Available at:https://www.sans.org/reading-

    room/whitepapers/wireless/security-vulnerabilities-wireless-lan-technology-1629[Accessed 28

    February 2014].

    Marinda, 2010. wireless dead zone. [Online] Available at:http://www.makeuseof.com/tag/what-is-a-

    wireless-dead-zone-and-how-to-eliminate-it/[Accessed 20 February 2014].

    Teddy, 2011. wifi security. [Online] Available at:http://www.pcworld.com/article/2052158/5-wi-fi-

    security-myths-you-must-abandon-now.html[Accessed 20 February 2014].

    TM, 2010. TM. [Online] Available at:https://www.tm.com.my/Home/Broadband/unifi/help-

    support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdf[Accessed 20 February

    2014].

    TM, 2013. Unifi. [Online] TM Available at:https://www.tm.com.my/Home/Broadband/unifi/help-

    support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdf[Accessed 20 February

    2014].

    https://www.sans.org/reading-room/whitepapers/wireless/security-vulnerabilities-wireless-lan-technology-1629https://www.sans.org/reading-room/whitepapers/wireless/security-vulnerabilities-wireless-lan-technology-1629https://www.sans.org/reading-room/whitepapers/wireless/security-vulnerabilities-wireless-lan-technology-1629https://www.sans.org/reading-room/whitepapers/wireless/security-vulnerabilities-wireless-lan-technology-1629http://www.makeuseof.com/tag/what-is-a-wireless-dead-zone-and-how-to-eliminate-it/http://www.makeuseof.com/tag/what-is-a-wireless-dead-zone-and-how-to-eliminate-it/http://www.makeuseof.com/tag/what-is-a-wireless-dead-zone-and-how-to-eliminate-it/http://www.makeuseof.com/tag/what-is-a-wireless-dead-zone-and-how-to-eliminate-it/http://www.pcworld.com/article/2052158/5-wi-fi-security-myths-you-must-abandon-now.htmlhttp://www.pcworld.com/article/2052158/5-wi-fi-security-myths-you-must-abandon-now.htmlhttp://www.pcworld.com/article/2052158/5-wi-fi-security-myths-you-must-abandon-now.htmlhttp://www.pcworld.com/article/2052158/5-wi-fi-security-myths-you-must-abandon-now.htmlhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttps://www.tm.com.my/Home/Broadband/unifi/help-support/Documents/OnlineSupport/RG%20DIR-615%20User%20Guide.pdfhttp://www.pcworld.com/article/2052158/5-wi-fi-security-myths-you-must-abandon-now.htmlhttp://www.pcworld.com/article/2052158/5-wi-fi-security-myths-you-must-abandon-now.htmlhttp://www.makeuseof.com/tag/what-is-a-wireless-dead-zone-and-how-to-eliminate-it/http://www.makeuseof.com/tag/what-is-a-wireless-dead-zone-and-how-to-eliminate-it/https://www.sans.org/reading-room/whitepapers/wireless/security-vulnerabilities-wireless-lan-technology-1629https://www.sans.org/reading-room/whitepapers/wireless/security-vulnerabilities-wireless-lan-technology-1629
  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    45/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 45

    Figure ListFigure 1 Overview of the internet flow ......................................................................................................... 5

    Figure 2 Modem (Huawei Echolife HG850a GPON Terminal) ....................................................................... 5

    Figure 3 Dlink Router (TM, 2013)................................................................................................................ 6

    Figure 4 Cat 5 UTP cable (Alan, 2010) ........................................................................................................ 7

    Figure 5 Fiber Optic (James, 2010) .............................................................................................................. 7

    Figure 6 Enter IP address in Web browser .................................................................................................. 10

    Figure 7 Figure out own IP address ............................................................................................................. 10

    Figure 8 Router firmware login page .......................................................................................................... 10

    Figure 9 Internet Setup ............................................................................................................................... 12

    Figure 10 Internet connection Setup wizard Confirmation page ............................................................... 12Figure 11 Internet Connection Setup Wizard Step 1 .................................................................................. 13

    Figure 12Dynamic IP address ...................................................................................................................... 13

    Figure 13 Static IP address .......................................................................................................................... 13

    Figure 14 Reboot device or run the wireless connection setup wizard...................................................... 14

    Figure 15Reboot .......................................................................................................................................... 14

    Figure 16 Wireless Connection Setup Wizard ............................................................................................. 14

    Figure 17 Setup your wireless network ...................................................................................................... 15

    Figure 18Setup Complete ........................................................................................................................... 15

    Figure 19Dynamic PPPoE ............................................................................................................................ 16

    Figure 20 Static PPPoE ................................................................................................................................ 17

    Figure 21 Wireless Connection Setup Wizard ............................................................................................. 18

    Figure 22 Setup wireless Network .............................................................................................................. 18

    Figure 23Set up wireless security password ............................................................................................... 19

    Figure 24Setup complete ............................................................................................................................ 19

    Figure 25Rebooting ..................................................................................................................................... 20

    Figure 26 Manual Wireless connection setup ............................................................................................ 20

    Figure 27Wireless Network Name Setup .................................................................................................... 21

    Figure 28LAN Setup ..................................................................................................................................... 22

    Figure 29Time and Date .............................................................................................................................. 23

    Figure 30Parental Control ........................................................................................................................... 24

    Figure 31Advanced Wireless ....................................................................................................................... 25

    Figure 32Advanced Network ...................................................................................................................... 26

    Figure 33Routing ......................................................................................................................................... 27

    Figure 34Device administrator .................................................................................................................... 27

    Figure 35Save and Restore ......................................................................................................................... 28

    Figure 36DDNS Setting ................................................................................................................................ 28

  • 5/25/2018 Lswn Assignment Individual APU (A+ ^^)

    46/46

    LSWN Individual Assignment

    Leim Jing Jie TP025470 Page 46

    Figure 37System Check ............................................................................................................................... 29

    Figure 38Internet connection of Ubuntu .................................................................................................... 30

    Figure 39Edit wireless connection (SSID) .................................................................................................... 30

    Figure 40 Edit wireless connection (password) .......................................................................................... 30

    Figure 41Edit wireless connection (Save connection) ................................................................................ 31

    Figure 42Wired connection ........................................................................................................................ 31

    Figure 43Wireless connection..................................................................................................................... 31

    Figure 44 default wifi router password....................................................................................................... 32

    Figure 45 Change password ........................................................................................................................ 32

    Figure 46SSID Name .................................................................................................................................... 33

    Figure 47Enable / disable hidden SSID ....................................................................................................... 33

    Figure 48Mac Filter ..................................................................................................................................... 34

    Figure 49WEP wireless security .................................................................................................................. 34

    Figure 50WPA/WPA2 (PSK) ......................................................................................................................... 35

    Figure 51WPA/WPA2 (EAP) ........................................................................................................................ 35

    Figure 52Enable firewall ............................................................................................................................. 36

    Figure 53Limit router IP address pool ......................................................................................................... 37

    Figure 54Port forwarding ............................................................................................................................ 39

    Figure 55Port forwarding (Choose computer name) .................................................................................. 40

    Figure 56Port forwarding (Computer name) .............................................................................................. 40

    Figure 57 Gantt Chart .................................................................................................................................. 42

    Figure60 Gantt chart