Lo 3 Ok

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

Pre-Test: What Do You Already Know?

Pre-Test LO 2

I. DIRECTIONS: Arrange the following procedures. Label your answer in ascending order.

A. Configuring a Router.
______ Assign the router a new username and password. 
______ Connect your router to your computer and your modem.
______ Enter in your router’s address. 
______ Enter in your username and password. 
______ Open a web browser. 
______ Reset your router if you can’t access it. 

B. Setting up Wireless Network.


______ Assign the router a new username and password. 
______ Connect your router to your computer and your modem.
______ Enter in your router’s address. 
______ Enter in your username and password. 
______ Open a web browser. 
______ Reset your router if you can’t access it. 

II. IDENTIFICATION: Identify what is being asked. Choose your answer in the box provided.

1. Computers for which the rule is applied.


2. It “Allow” or “Block” based on what the rule is supposed to do.
3. Rule that controls the connections performed by a specific Windows service or feature.
4. Rule that controls the connections performed by a specific Windows service or feature.
5. Shares the network protocols for which the rule is applied.
6. Tells the user whether that rule overrides an existing block rule. By default, all rules should
have the value “No” for this parameter.
7. Tells the user whether the rule is applied for connections made on specific local ports or
not.
8. Tells the user whether the rule is applied for connections made on specific remote ports or
not.
9. Tells the user whether the rule is applied only when devices with specific IP addresses are
connected or not.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
10. Tells the user whether the rule is applied only when your computer has a specific IP
address or not.
11. tells the user whether the rule is enabled and applied by Windows Firewall or not.
12. The network location/profile the rule is applied to: private, public, or domain (for business
networks with network domains).
13. The rule applies to a specific program.
14. The rule applies to the network traffic that is performed through a specific port.
15. The rule is applied only when the computer is connected to a network domain.
16. The rule is applied only when the computer is connected to trusted private networks.
17. The rule is applied only when the computer is connected to untrusted public networks.
18. The user account which is set as the owner/creator of the rule.
19. The user accounts for which the rule is applied (for inbound rules only).
20. This applies only to apps from the Windows Store and it shares the package name of the
app the rule applies to.

Action Application package Authorized computers Authorized users


Domain Enabled Local address Local port
Local user owner Override Port Predefined
Predefined Private Profile Program
Protocol Public Remote address Remote port

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
DISCUSSION: INFORMATION SHEET

LO3: Set Router/Wi-fi/Wireless access point/Repeater Configuration


Learning Code: TLE_IACSS912SUCN-If-j-IIae-35

Objectives:
3.1 Configure client device systems settings in accordance with manufacturer’s instructions
and end user preference
3.2 Configure LAN in accordance with manufacturer’s instructions and network design
3.3 Configure WAN in accordance with manufacturer’s instructions and network design
3.4 Configure wireless settings in accordance with manufacturer’s instructions, network
design, and end-user preferences
3.5 Configure security/firewall/advanced settings in accordance with manufacturers
instruction and end-user preference

How to Configure Local Network Area

Step 1: Attach the RJ-45 connector to the Ethernet network port on


your PC.

Step 2: Right click on ‘My Network Places’ icons


located on the desktop and in the popup
menu. Click on Properties

 Alternatively, click ‘Start’ from the


taskbar and right click on ‘My Network
Places’ option from the popup menu.
In the menu that appears select
‘Properties’

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Step 3:
Right-click on ‘Local Area Connection’ in the
new Window that appears (under the LAN or
High-Speed internet section).

Step 4: Click Properties in the popup menu that appears.

Step 5: Scroll down and select ‘Internet Protocol


(TCP/IP) and click on ‘Properties' in the Local Area
Connection dialog box that appears under the
connection box.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Step 6: Opt for obtaining the configuration
settings automatically or manually. To obtain
the settings automatically, select ‘Obtain an IP
Address Automatically’. However, to use this
option, you will need to have a DHCP server
that will function in allocating and managing IP
address to ensure that there are no conflicts.

Step 7:
Configure your PC to the network manually, if you modem isn't
connected that with the options mentioned above.

 Click the option ‘Use the following IP Address’.

Enter the IP address to use. It is important


that you consult your network administrator on the
IP to use so as to avoid conflicts occurring in the
network, i.e. a situation where two PCs have similar
IP addresses.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Enter the Subnet Mask and Default gateway. The subnet
mask is used to identify the network level you are in while
the default gateway identifies the router connection.

Step 8: Check the option ‘Show


icon in notification area when
connected.

Step 9: Click ‘OK”. This will enable you to know if the local area
connection is connected or disconnected.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
How to Configure a Router

Configuring router is divided into several parts, namely;

Part 1: Connecting to the Router


Part 2: Setting up a Wireless Network
Part 3: Forwarding Ports
Part 4: Blocking Websites

Part 1: Connecting to the Router

Step 1: Connect your router to your computer and your


modem. Use Ethernet cables to connect your modem to the
WAN/WLAN/Internet port on your router, and connect your
computer to the “1”, “2”, “3”, or “4” port on the router.

Step 2: Open a web browser. Your router’s configuration page


can be accessed by any computer that is connected to the same
network. When configuring your router, you will have the best
results if you connect with a computer that is wired to the router
with an Ethernet cable.

Part 3: Enter in your router’s address. Routers are


accessed through your web browser by entering
the IP address into the address bar. The IP address
varies a bit by manufacturer, but most are the
same or very close. These are some of the more
popular manufacturers and the associated
addresses:[1]
 Linksys - http://192.168.1.1
 3Com - http://192.168.1.1
 D-Link - http://192.168.0.1
 Belkin - http://192.168.2.1
 Netgear - http://192.168.1.1
 Most routers have their default address printed in the documentation or on a sticker on
the router itself. You can also look it up online on the manufacturer’s website.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Step 4: Enter in your username and password. Before
you access the configuration page, you’ll be asked for a
username and password. Most routers will come with a
default username/password combo, while some allow
you to proceed without entering anything.
 Your router’s documentation will tell you the
default username and password required. They
may also be printed on the router itself.
 ”admin” is one of the most common default
usernames.
 ”admin” or “password” are two of the most common passwords.

Step 5: Reset your router if you can’t access it. If you’ve


looked up your default address and username/password
combo and you still can’t access your router, you can
reset it to factory defaults to clear out any changes that
may have been made. This is useful for secondhand
routers or old changes that you can’t remember.

 You can reset your router by pressing the Reset


button on it. This button is usually small and recessed, and can only be reached by a
paper clip. Some routers have a button that can be pressed more easily.
 After pressing the reset button, wait 30-60 seconds and then try entering the router’s
address and username/password combination again.

Step 6: Assign the router a new username and


password. Leaving your router with the default username and
password is very insecure, and you should change it immediately
after setting it up. You can usually find this in the Administration
section of the router configuration.
 Choose a username and password that can’t be easily
guessed. Include numbers and symbols in the password
to make sure that it is hard to crack.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Part 2: Setting up a Wireless Network

Step 1: Check your Internet settings. In the


Internet, Setup, or Home menu of your router,
check that your Internet IP address, DCHP, and
DNS settings are all set. These should typically
be set to automatic unless your service provider
informs you otherwise.

 Many routers will provide a test button


on the Internet menu page. Click it to
check if your internet settings are
configured correctly.

Step 2: Open the Wireless settings. This menu may be


called Wireless, Wireless Settings, Basic Setup, or
something similar. This page will display your wireless
SSID, channel, encryption, and other settings.

Step 3: Name your network. Find the field labeled


SSID. This is the name of your network, and it will
appear in the list of available networks for your
wireless devices. Be sure to not put any personal
information in your network name, as the name will
be public.

 Make sure that the “Enable SSID Broadcast”


box is checked.
 The Channel should be set to Auto. If you
have a lot of wireless networks in your
area, your router will automatically move the network to a clean channel.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Step 4: Choose your wireless encryption. This can
also be called the Security Options. Here you’ll be
able to choose which method you want to use to
encrypt your network traffic. The options for most
routers are WEP, WPA-PSK, and WPA2-PSK.

 WPA2 is the most secure mode of


encryption, and you should use it if all of
your devices support it. Only older
devices do not support WPA2.

Step 5: Choose a passphrase. The


passphrase is what you enter when a
device connects to your network. A
strong passphrase will help protect
your network from unwanted
intruders. You should always have a
passphrase for your network.

Step 6: Apply your settings. Once you have


chosen your SSID, encryption type, and
passphrase, click the Apply or Save button to
start your wireless network. Your router will
process for a few seconds, and then your
wireless network will be detectable by your
wireless devices.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Part 3: Forwarding Ports

Step 1: Open the Port Forwarding menu. This


can usually be found in the Advanced section
of the router’s configuration page.

Step 2: Add a new service or rule. Click the


button to add a custom service. This will
open a form where you can enter the port
forwarding information.

 Name/Service Name – This is the


name of the program you are port
forwarding for. The name is only for
you to easily recognize it in a list.
 Protocol – Your options are TCP,
UDP, and TCP/UDP. Refer to the
program you are forwarding the
port for to see what option you should choose.
 External Starting Port – This is the first port in the range of ports that you want to open.
 External Ending Port – This is the last port in the range of ports that you want to open. If
you are only opening one port, enter the same port into this field.
 Check the box that uses the same port range for the Internal ports, or fill out the same
information for the Internal port fields.
 Internal IP address – This is the IP address for the computer that you want to open the
port for. To find out the IP address for the device, follow this guide for PC or this
guide for Mac OS X.

Step 3: Save or Apply the rule. Your router will process for a few
moments, and then the changes will be applied. Your program will
now be able to access the open port for the computer you
specified.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Part 4: Blocking Websites

Step 1: Open the Block Sites menu. This can be


found in the Security or Parental Controls section of
the configuration menu. You can block sites from
being accessed by any device on your network,
though you can allow specific devices to access
them. You can also set a schedule for the blocks,
which is especially useful for homework time or
when you need to focus on work.

Step 2: Add a site to the block list. Your


options will change depending on the
router you are using. Some routers allow
you to block keywords as well as specific
sites. Add what you want to block to the
list.

Step 3: Allow trusted computers to view


blocked sites. You can check a box to
allow trusted IP addresses to view
blocked sites. This can be useful for
parents who still want access to the sites
that they’ve blocked for their kids.

 Once you’ve checked the box,


add it the IP addresses you want
to bypass the blocks. This
guide will tell you how to find
your IP address.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Step 4: Set your block schedule. This
may be in a separate menu from the
block list. You can select which days of
the week you want the block to take
effect, as well as the time of day that it
is implemented. Once you are done,
click the Apply button.

Using Windows Firewall with Advanced Security

Windows Firewall with


Advanced Security

  Windows
Firewall with Advanced
Security is a
management snap-in
for the Windows
Firewall from which you

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
can control in a very detailed way, all the rules and exceptions that govern how the Windows
Firewall works.

In order to access it, you need to open the Windows Firewall as shown in the previous
lesson and then click or tap the “Advanced settings” link on the column on the left.

“Windows Firewall with


Advanced Security” is now
open. This snap-in looks
big and scary at first, and
for good reason. This is
where Windows Firewall
stores all its rules at a very
detailed level. What we
have seen in the previous
lesson is only a limited but
user-friendly view of the
rules that govern its
functioning. This is where
you get dirty and edit any
parameter, no matter how
small, for any rule and
exception

Understanding Inbound, Outbound & Connection Security Rules

In Windows Firewall with Advanced Security you will encounter three important types
of rules:

 Inbound rules – they apply to traffic that is coming from the network or the Internet to your
Windows computer or device. For example, if you are downloading a file through BitTorrent,
the download of that file is filtered through an inbound rule.
 Outbound rules – these rules apply to traffic that is originating from your computer and going
to the network and the Internet. For example, your request to load the How-To Geek website
in your web browser is outbound traffic and it is filtered through an outbound rule. When the
website is downloaded and loaded by your browser, this is inbound traffic.
 Connection security rules –less common rules that are used to secure the traffic between two
specific computers while it crosses the network. This type of rule is used in very controlled
environments with special security requirements. Unlike inbound and outbound rules which
are applied only to your computer or device, connection security rules require both computers
involved in the communication to have the same rules applied.

All the rules can be configured so that they are specific to certain computers, user
accounts, programs, apps, services, ports, protocols, or network adapters.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
You can display the rules of a certain type by selecting the appropriate category in the
column on the left.

You
will see lots of inbound and outbound rules. Some rules will have a green checkmark near their
name while others will have a gray one. The rules with the green checkmark are enabled,
meaning that they are used by Windows Firewall. Those with a gray checkmark are disabled
and they are not used by Windows Firewall.

Windows Firewall rules have the following parameters that can be edited:

 Name – the name of the rule you are viewing.


 Group – the group the rule belongs to. Generally, the group describes the app or the Windows
feature the rule belongs to. For example, rules that apply to a specific app or program will have
the app/program name as the group. Rules that are related to the same networking feature,
e.g. File and Printer Sharing, will have as a group name the feature they relate to.
 Profile – the network location/profile the rule is applied to: private, public, or domain (for
business networks with network domains).
 Enabled – it tells you whether the rule is enabled and applied by Windows Firewall or not.
 Action – the action can “Allow” or “Block” based on what the rule is supposed to do.
 Override – tells you whether that rule overrides an existing block rule. By default, all rules
should have the value “No” for this parameter.
 Program – the desktop program the rule applies to.
 Local address – tells you whether the rule is applied only when your computer has a specific IP
address or not.
 Remote address – tells you whether the rule is applied only when devices with specific IP
addresses are connected or not.
 Protocol – shares the network protocols for which the rule is applied.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
 Local port – tells you whether the rule is applied for connections made on specific local ports
or not.
 Remote port – tells you whether the rule is applied for connections made on specific remote
ports or not.
 Authorized users – the user accounts for which the rule is applied (for inbound rules only).
 Authorized computers – computers for which the rule is applied.
 Authorized local principals – the user accounts for which the rule is applied (for outbound
rules only).
 Local user owner – the user account which is set as the owner/creator of the rule.
 Application package – this applies only to apps from the Windows Store and it shares the
package name of the app the rule applies to.

What Can Be Monitored from the Windows Firewall with Advanced Security

Beneath the three types of rules mentioned earlier, you will find a section named
“Monitoring.” If you expand it, you can view the active firewall rules, the active connection
security rules, and view the active security associations.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
A security association is something that most of us will never use. This is the information
maintained about a secure encrypted channel on the local computer or device, so that this
information can be used for future network traffic to a specific remote computer or device.
Here you can view which peers are currently connected to your computer and which protection
suite was used by Windows to form the security association.

How to Manage Existing Windows Firewall Rules

The first thing you should keep in mind when working with the rules that are built into
the Windows Firewall is that it is better to disable a rule than delete it. In case you do
something ill-advised, then it is very easy to repair everything by re-enabling disabled rules.
Rules which get deleted cannot be recovered unless you restore all the Windows Firewall
settings to their defaults.

To disable a rule, first select it and then press “Disable Rule” on the column on the right.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Alternatively, you can also right click on a rule and select “Disable Rule.”

If you want to edit a rule and the way it works, you can do so by double-clicking on it,
selecting it, and then pressing “Properties” in the column on the right or right-clicking on it and
selecting “Properties.”

All the parameters we have mentioned earlier in this lesson can be modified in the
“Properties” window of that rule.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
When you are done making your changes, don’t forget to press “OK,” so that they are
applied.

How to Create an Outbound Rule for the Windows Firewall

Creating rules in Windows Firewall with Advanced Security is easier than you
would think and it involves using a friendly wizard. To illustrate, let’s create an
outbound rule that blocks access to the network and the Internet for Skype, only
when you are connected to untrusted public networks.

To do this, go to “Outbound Rules” and press “New Rule” in the column on


the right.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
This opens the “New Outbound Rule Wizard,” where you will create the new
rule in just a couple of steps. First, you are asked to select the type of rule you want
to create.

Your choices are:

 Program – the rule applies to a specific program


 Port – the rule applies to the network traffic that is performed through a specific
port
 Predefined – rule that controls the connections performed by a specific Windows
service or feature
 Custom – a custom rule that can block both programs and ports or a specific
combination of both.

For our example, we have selected “Program” and pressed “Next.”

Depending on what you have chosen at the previous step, you are now asked
to select the program or the ports that you want to add to the rule.

For our example, we have selected the executable of the program that we
want to block – Skype.exe. When you’ve finished setting things up, press “Next.”

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Next, you specify the action that should be taken:

 Allow the connection – this includes both secure and insecure connections
 Allow the connection if it is secure – the connection is allowed only if it is made
through a secure channel. You can specify the kind of authentication and
encryption you want applied by pressing “Customize”
 Block the connection – blocks the connection, whether it is secure or not

For our example we have selected “Block the connection” and pressed “Next.”

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Now you are asked to select when the rule applies. This means the network
location when the rule is applied:

 Domain – the rule is applied only when the computer is connected to a network
domain
 Private – the rule is applied only when the computer is connected to trusted
private networks
 Public – the rule is applied only when the computer is connected to untrusted
public networks

For our example we have chosen “Public” because we wanted to block access only
when the computer is connected to untrusted public networks.

When done making your choice, press “Next.”

You are asked to


enter a name and a description for the newly created rule. Please don’t take the
easy way out when you do this. Write something that is very descriptive so that you
can understand what’s up with this rule later, when you need to edit the Windows
Firewall rules.

Press “Finish” and the rule is created and used by the Windows Firewall.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
How to Create an Inbound Rule for the Windows Firewall

In Windows Firewall with Advanced Security, go to “Inbound Rules” and press


“New Rule” in the column on the right.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
The “New Inbound Rule Wizard” is started. The options it displays are almost
the same as the “New Outbound Rule Wizard” so we won’t explain everything again.
We will provide more detail only where it makes sense.

To explain, we have created a rule which blocks all inbound traffic made using the
TCP protocol on the port 30770. At the first step we selected “Program” and pressed
“Next.”

Now we are asked to select the protocol for which the rule applies and the
port. The choices for protocols are TCP and UDP. If you want a rule that applies to
both, you need to create two rules, one for each protocol.

Then, we had the choice to block all ports or only specific ones. We selected
“Specific local ports”, entered “30770,” and pressed “Next.”

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Now you are asked to select what action to take when a connection matches the
conditions specified earlier. For our example, we have chosen “Block the connection” and
pressed “Next.”

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Now you have to select the network locations for which the rule applies.
Since we wanted to block all TCP traffic on port 30770, we selected all three
locations and pressed “Next.”

Finally, enter the name and the description for the newly created rule and press
“Finish.”

The rule has been created and it is now used by the Windows Firewall.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
How to Restore Windows Firewall to its Defaults

If you have fiddled too much with the rules in Windows Firewall and things have started
to work incorrectly, you can easily undo all your settings and restore Windows Firewall to its
defaults. This can be done only for an administrator account.

To do this, open the Windows Firewall and from the left column, click or tap “Restore defaults.”

You are now informed of what this resetting will do, when you’re ready, press “Reset
defaults.”

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
You are asked to confirm that you are okay to go ahead with the reset.

You are back to the “Windows Firewall” window. All its settings have been reset to the
defaults as if your Windows installation were brand new. You can now reconfigure its settings
from scratch and hopefully solve your problems.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Congratulations!
You did a great job! Rest and relax while then
move on to the next lesson. Good Luck!

REFERENCES

https://www.deped.gov.ph/wp-content/uploads/2019/01/Computer-Systems-Se
rvicing-NC-II-CG.pdf
https://tesda.gov.ph/Download/Training_Regulations?Searchcat=Training%20Re
gulations
https://pyramidsolutions.com/network-connectivity/blog-nc/what-is-network-connectiv
ity/
https://www.wikihow.com/Configure-Local-Network-Area
https://www.wikihow.com/Configure-a-Router
https://www.howtogeek.com/school/windows-network-security/lesson5/

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Post-Test: How Much Have You Learned?

POST-TEST

I. DIRECTIONS: Arrange the following procedures. Label your answer in ascending order.

A. Configuring a Router.
______ Assign the router a new username and password. 
______ Connect your router to your computer and your modem.
______ Enter in your router’s address. 
______ Enter in your username and password. 
______ Open a web browser. 
______ Reset your router if you can’t access it. 

B. Setting up Wireless Network.


______ Assign the router a new username and password. 
______ Connect your router to your computer and your modem.
______ Enter in your router’s address. 
______ Enter in your username and password. 
______ Open a web browser. 
______ Reset your router if you can’t access it. 

II. IDENTIFICATION: Identify what is being asked. Choose your answer in the box provided.

1. Computers for which the rule is applied.


2. It “Allow” or “Block” based on what the rule is supposed to do.
3. Rule that controls the connections performed by a specific Windows service or feature.
4. Rule that controls the connections performed by a specific Windows service or feature.
5. Shares the network protocols for which the rule is applied.
6. Tells the user whether that rule overrides an existing block rule. By default, all rules should
have the value “No” for this parameter.
7. Tells the user whether the rule is applied for connections made on specific local ports or
not.
8. Tells the user whether the rule is applied for connections made on specific remote ports or
not.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
9. Tells the user whether the rule is applied only when devices with specific IP addresses are
connected or not.
10. Tells the user whether the rule is applied only when your computer has a specific IP
address or not.
11. tells the user whether the rule is enabled and applied by Windows Firewall or not.
12. The network location/profile the rule is applied to: private, public, or domain (for business
networks with network domains).
13. The rule applies to a specific program.
14. The rule applies to the network traffic that is performed through a specific port.
15. The rule is applied only when the computer is connected to a network domain.
16. The rule is applied only when the computer is connected to trusted private networks.
17. The rule is applied only when the computer is connected to untrusted public networks.
18. The user account which is set as the owner/creator of the rule.
19. The user accounts for which the rule is applied (for inbound rules only).
20. This applies only to apps from the Windows Store and it shares the package name of the
app the rule applies to.

Action Application package Authorized computers Authorized users


Domain Enabled Local address Local port
Local user owner Override Port Predefined
Predefined Private Profile Program
Protocol Public Remote address Remote port

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education

You might also like