SlideShare a Scribd company logo
1 of 5
   Configure the LAN
    gateway address (inside
    interface) and mask
   Save settings (which
    reboots the router)
   Reset the host IP
    address and gateway for
    the WLAN address range
   Refresh the browser to
    http://10.1.1.1
   Set the DHCP address
    pool
   Configure an exclusions
    (servers and printers)
   Set the time and save
   Test DHCP and test
             WLAN gateway
   Select manual
   For 5GHz and
    2.4 GHZ
    ◦ Select the
      Network Mode
    ◦ Enter the SSID
    ◦ Leave Channel
      width and
      Channel to
      auto
    ◦ Set SSID
      broadcast
   Save
   Test by
    connecting
    wireless host
For Windows 7:
   Network and Sharing
    Centre
   Setup a new connection or
    network
   Manually connect to a
    wireless network
   Enter information for the
    wireless network
   Select the network from
    the Wireless network
    connection list
   Connect to the network
Test the connection by pinging
    the LAN interface (LAN
    gateway) from a wireless
    host
   Select the best security mode supported by your
    wireless hosts for both bands
   Set up a strong secure password
   Save and test and document
   Select enabled
   Select Permit PCs
    or Prevent PCs
   Add the Mac
    address of host to
    either permit or
    prevent to the
    Wireless Client List
   Save and Test
   Document

More Related Content

What's hot

Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeleyjoebeone
 
Wireshark
WiresharkWireshark
Wiresharkbtohara
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning Viren Rao
 
Michael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent WorkMichael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent WorkMichael Freyberger
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suiteYash Kotak
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniquesinbroker
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDPsangusajjan
 
Wireshar training
Wireshar trainingWireshar training
Wireshar trainingLuke Luo
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementationMohibullah Saail
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkAl Imran, CISA
 

What's hot (20)

Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Wireshark
WiresharkWireshark
Wireshark
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
Ping
PingPing
Ping
 
Michael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent WorkMichael Freyberger Sophomore Independent Work
Michael Freyberger Sophomore Independent Work
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDP
 
Wireshar training
Wireshar trainingWireshar training
Wireshar training
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementation
 
Wireshark
WiresharkWireshark
Wireshark
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
 

Viewers also liked

WIFI; making a wireless connection
WIFI; making a wireless connectionWIFI; making a wireless connection
WIFI; making a wireless connectionWebster University
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Designnakomuri
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lanDeepak John
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOLKak Yong
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configurationyasir1122
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 

Viewers also liked (12)

WIFI; making a wireless connection
WIFI; making a wireless connectionWIFI; making a wireless connection
WIFI; making a wireless connection
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similar to Basic config

Рекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoРекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoCisco Russia
 
presentation_4102_1493726768.pdf
presentation_4102_1493726768.pdfpresentation_4102_1493726768.pdf
presentation_4102_1493726768.pdfssuserf0e32f
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
HiGuard Pro installation
HiGuard Pro installationHiGuard Pro installation
HiGuard Pro installationsharetech
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - EnglishAdhie Lesmana
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkArunabh Mishra
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Agnieszka Kuba
 
Session 6 Tp 6
Session 6 Tp 6Session 6 Tp 6
Session 6 Tp 6githe26200
 
Lan chat system
Lan chat systemLan chat system
Lan chat systemWipro
 
[Advantech] ADAM-3600 open vpn setting Tutorial step by step
[Advantech] ADAM-3600 open vpn setting Tutorial step by step [Advantech] ADAM-3600 open vpn setting Tutorial step by step
[Advantech] ADAM-3600 open vpn setting Tutorial step by step Ming-Hung Hseih
 

Similar to Basic config (20)

Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
Рекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoРекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС Cisco
 
presentation_4102_1493726768.pdf
presentation_4102_1493726768.pdfpresentation_4102_1493726768.pdf
presentation_4102_1493726768.pdf
 
MTCNA Show.pptx
MTCNA Show.pptxMTCNA Show.pptx
MTCNA Show.pptx
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Wintel ppt for dhcp
Wintel ppt for dhcpWintel ppt for dhcp
Wintel ppt for dhcp
 
Secure network
Secure networkSecure network
Secure network
 
P09
P09P09
P09
 
HiGuard Pro installation
HiGuard Pro installationHiGuard Pro installation
HiGuard Pro installation
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
Dhcp Snooping
Dhcp SnoopingDhcp Snooping
Dhcp Snooping
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
 
Assigning ip addresses
Assigning ip addressesAssigning ip addresses
Assigning ip addresses
 
Session 6 Tp 6
Session 6 Tp 6Session 6 Tp 6
Session 6 Tp 6
 
Lan chat system
Lan chat systemLan chat system
Lan chat system
 
[Advantech] ADAM-3600 open vpn setting Tutorial step by step
[Advantech] ADAM-3600 open vpn setting Tutorial step by step [Advantech] ADAM-3600 open vpn setting Tutorial step by step
[Advantech] ADAM-3600 open vpn setting Tutorial step by step
 
Networking 101
Networking 101Networking 101
Networking 101
 

More from lyndyv

Datarate
DatarateDatarate
Dataratelyndyv
 
Logging
LoggingLogging
Logginglyndyv
 
Policy
PolicyPolicy
Policylyndyv
 
Capacity
CapacityCapacity
Capacitylyndyv
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Auth and association
Auth and associationAuth and association
Auth and associationlyndyv
 
Port forward
Port forwardPort forward
Port forwardlyndyv
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilterslyndyv
 
Firewall
FirewallFirewall
Firewalllyndyv
 
Csmaca
CsmacaCsmaca
Csmacalyndyv
 
Service set
Service setService set
Service setlyndyv
 
Signals1
Signals1Signals1
Signals1lyndyv
 
Modulation
ModulationModulation
Modulationlyndyv
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Wireless components
Wireless componentsWireless components
Wireless componentslyndyv
 

More from lyndyv (17)

Datarate
DatarateDatarate
Datarate
 
Logging
LoggingLogging
Logging
 
Policy
PolicyPolicy
Policy
 
Capacity
CapacityCapacity
Capacity
 
Security standard
Security standardSecurity standard
Security standard
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Dhcp
DhcpDhcp
Dhcp
 
Port forward
Port forwardPort forward
Port forward
 
Nat
NatNat
Nat
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
 
Firewall
FirewallFirewall
Firewall
 
Csmaca
CsmacaCsmaca
Csmaca
 
Service set
Service setService set
Service set
 
Signals1
Signals1Signals1
Signals1
 
Modulation
ModulationModulation
Modulation
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Wireless components
Wireless componentsWireless components
Wireless components
 

Basic config

  • 1. Configure the LAN gateway address (inside interface) and mask  Save settings (which reboots the router)  Reset the host IP address and gateway for the WLAN address range  Refresh the browser to http://10.1.1.1  Set the DHCP address pool  Configure an exclusions (servers and printers)  Set the time and save  Test DHCP and test  WLAN gateway
  • 2. Select manual  For 5GHz and 2.4 GHZ ◦ Select the Network Mode ◦ Enter the SSID ◦ Leave Channel width and Channel to auto ◦ Set SSID broadcast  Save  Test by connecting wireless host
  • 3. For Windows 7:  Network and Sharing Centre  Setup a new connection or network  Manually connect to a wireless network  Enter information for the wireless network  Select the network from the Wireless network connection list  Connect to the network Test the connection by pinging the LAN interface (LAN gateway) from a wireless host
  • 4. Select the best security mode supported by your wireless hosts for both bands  Set up a strong secure password  Save and test and document
  • 5. Select enabled  Select Permit PCs or Prevent PCs  Add the Mac address of host to either permit or prevent to the Wireless Client List  Save and Test  Document