SlideShare a Scribd company logo
1
Configuring Linksys Wireless
Router
ANKUSH
Smart serve InfoTech
2
Main Issues
• Physical Connection
• Interfacing with the broad band Modem (cable,
DSL)
• Adjusting the configuration on the broad band
Modem and upgrading the modem firmware.
• Basic router setup
– Accessing the Web Interface
– Upgrading the router firmware
– Admin account
– IP addresses
3
Main Issues
• Wireless Setup
– SSID
– Channel
– Security
– MAC Filter
• Firewall
• Work Station Configurations:
– IP address
– XP Firewall
– Testing
4
Broad Band Modem
• Before you connect your wireless router,
do the following while your PC is
connected directly to your broad band
router.
• Updating Firmware: “Click on Modem
Firmware Update”
• DSL Help
– Bridging Instructions
– Linksys Router Config.
5
Connect the router to your Modem:
Physical Setup
For more information read: Wireless Quick Start Guide
Must be the cable
that came with your
modem (it is cross-
over in case of DSL)
Straight-
Through Cable
Check the
“Internet” LED
in the front
Side
Restart Everything before you test
6
Router
• Tech Support
• Search by answer ID for any of those
issues
– Setting up PPPoE DSL with a BEFW11S4:
Answer ID 527
7
Wireless Router Web Access
Leave the user name blank.
Password is admin
8
Main Menus and Sub Menus
A Main Menu Item
Sub-Menu Items for
the “Setup” menu
Wireless Router Model #
Firmware Version
9
“Basic Setup” Sub-Menu
Router to
Modem setup
Router’s IP
Address
Disable
DHCP, It is
safer to use
Static IPs
Take a note of
the DNS Server
Addresses Save
Help
10
Configure your PC and test
• Configure your PC’s TCP/IP properties (Do this
on a wired PC first. We will deal with Wireless
PCs later):
– IP address
– Subnet Mask
– Default Gateway
– Primary DNS Server Address
– Secondary DNS Server Address
• Open your browser and test the Connection
11
Before You Start
Change the Password
12
Also in the “Management” Sub-
Menu: UPnP
Universal Plug and Play has to be enabled for some applications (MS
Messenger audio and video for example) to work
13
Before You Start
Update The Router Firmware
Browse to where you have downloaded the router firmware from the vendor web site
14
Before You Start
Update The Wireless NIC Driver
• Gather information about:
– Your wireless NIC (model number, etc…)
– Operating system (Win XP, etc…)
• Visit the manufacture web site, go to the
tech support page and download the
dirver
• Install the driver
• This insures that you will be able to
configure the latest security features
15
Configuring the Radio Interface
Enable the radio interface,
configure the SSID and disable
SSID Broadcasting
16
Configure WEP Key
Make sure that you right down the automatically generated 26 hex digits key. The
hex key will be used later to configure the wireless clients
17
Stronger Encryption
18
MAC Authentication
To get the MAC address of
your Wireless card, Go to
DOS and type “ipconfig /all
19
Advanced Settings “Just in case!”
20
High Gain Antenna
21
Configuring the Wireless Client
• Depends on the configuration utility of
your card.
22
Configuring Port Forwarding
23
Public IP address and DNS Info.
24
Examining the Log File
Must download and install the log viewer application from Linksys web site
Where the log file will be stored
Choose
25
Log Viewer
You can also
open the log
file in MS Word
26
Setting up the Client
WEP 64,
or 128 bit
Match the SSID on AP
(Case Sensitive)
Both must
be checked
for WPA
27
WEP
28
WPA
29
XP Firewall
• Troubleshooting Windows Firewall in Microsoft
Windows XP Service Pack 2
• The document includes detailed explanation of
how to use the following Windows Firewall
Troubleshooting Tools:
– Netsh firewall commands
– Windows firewall logging files
– The netstat tool
• Most of the firewall configuration can also be
done from the CLI. Example:
– >netsh firewall set port opening TCP 80 disable

More Related Content

What's hot

Wi fi
Wi fiWi fi
Wi fi
kendre1234
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
AmzadKhn
 
Router configuration
Router configurationRouter configuration
Router configuration
ChoyonBonik
 
Zigbee technology2
Zigbee technology2Zigbee technology2
Zigbee technology2
Presentaionslive.blogspot.com
 
LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in Depth
APNIC
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
Waqas Ahmed Nawaz
 
Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?
Nigel Bowden
 
Wireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeWireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeXaver Y.R. Chen
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
Waqas Ahmed Nawaz
 
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
Premier Farnell
 
ROUTER PPT
ROUTER PPTROUTER PPT
ROUTER PPTJw Media
 
Configure router for wap (wireless access point
Configure router for wap (wireless access pointConfigure router for wap (wireless access point
Configure router for wap (wireless access point
sergio goco
 
LoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesLoRa application for detecting the harmful gases
LoRa application for detecting the harmful gases
PARNIKA GUPTA
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
Ankit Anand
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
Vignesh kumar
 
Wi-Fi
Wi-FiWi-Fi
zigbee technology
zigbee technology zigbee technology
zigbee technology
N.CH Karthik
 

What's hot (19)

Wi fi
Wi fiWi fi
Wi fi
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Zigbee technology2
Zigbee technology2Zigbee technology2
Zigbee technology2
 
LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in Depth
 
Etherfast3828
Etherfast3828Etherfast3828
Etherfast3828
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
 
Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?
 
Wireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeWireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBee
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 3
 
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
 
ROUTER PPT
ROUTER PPTROUTER PPT
ROUTER PPT
 
Configure router for wap (wireless access point
Configure router for wap (wireless access pointConfigure router for wap (wireless access point
Configure router for wap (wireless access point
 
LoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesLoRa application for detecting the harmful gases
LoRa application for detecting the harmful gases
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 

Viewers also liked

Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers Presentation
Fahd Allebdi
 
Configuracion de un router wireless
Configuracion de un router wirelessConfiguracion de un router wireless
Configuracion de un router wirelessAlberto Jimenez
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot Attacks
Greg Foss
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
Anshuman Biswal
 
Configuring the Apache Web Server
Configuring the Apache Web ServerConfiguring the Apache Web Server
Configuring the Apache Web Serverwebhostingguy
 
Understanding IIS
Understanding IISUnderstanding IIS
Understanding IIS
Om Vikram Thapa
 
WAP- Wireless Application Protocol
WAP- Wireless Application ProtocolWAP- Wireless Application Protocol
WAP- Wireless Application Protocol
Senthil Kanth
 
Wlan security
Wlan securityWlan security
Wlan security
Upasona Roy
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniquesGupta6Bindu
 
Wap ppt
Wap pptWap ppt
Wap ppt
Abhijit Nath
 
Switching
SwitchingSwitching
Switching
sheekha_11
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 

Viewers also liked (19)

Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers Presentation
 
Efecto Gestalt
Efecto GestaltEfecto Gestalt
Efecto Gestalt
 
Configuracion de un router wireless
Configuracion de un router wirelessConfiguracion de un router wireless
Configuracion de un router wireless
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot Attacks
 
Internet information services(iis)
Internet information services(iis)Internet information services(iis)
Internet information services(iis)
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
IIS 7: The Administrator’s Guide
IIS 7: The Administrator’s GuideIIS 7: The Administrator’s Guide
IIS 7: The Administrator’s Guide
 
Configuring the Apache Web Server
Configuring the Apache Web ServerConfiguring the Apache Web Server
Configuring the Apache Web Server
 
Understanding IIS
Understanding IISUnderstanding IIS
Understanding IIS
 
WAP- Wireless Application Protocol
WAP- Wireless Application ProtocolWAP- Wireless Application Protocol
WAP- Wireless Application Protocol
 
Wlan security
Wlan securityWlan security
Wlan security
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
Switching
SwitchingSwitching
Switching
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 

Similar to Configuring linksys wireless router

802.11n wireless router enhwi n3-encore_electronics
802.11n wireless router enhwi n3-encore_electronics802.11n wireless router enhwi n3-encore_electronics
802.11n wireless router enhwi n3-encore_electronics
Felix Hernandez
 
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdfQRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
mindhackers161
 
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementWebinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Netgear Italia
 
Caravan park and campground WiFi hotspot Do it yourself
Caravan park and campground WiFi hotspot   Do it yourselfCaravan park and campground WiFi hotspot   Do it yourself
Caravan park and campground WiFi hotspot Do it yourselfGuest Internet
 
CAHs Using Health Information Technology
CAHs Using Health Information TechnologyCAHs Using Health Information Technology
CAHs Using Health Information Technologywebhostingguy
 
Mersive Solstice & the Corporate Enterprise Network
Mersive Solstice & the Corporate Enterprise NetworkMersive Solstice & the Corporate Enterprise Network
Mersive Solstice & the Corporate Enterprise Network
Paul Richards
 
Manual repetidor wi fi
Manual repetidor wi fiManual repetidor wi fi
Manual repetidor wi fi
Patrícia Nascimento
 
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PROIDEA
 
CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home Network
Christopher Grayson
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
NetProtocol Xpert
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
GENIANS, INC.
 
Qig di 604
Qig di 604Qig di 604
Qig di 604
Gilberto Batista
 
Richard Bronson Full Resume 2015
Richard Bronson Full Resume 2015Richard Bronson Full Resume 2015
Richard Bronson Full Resume 2015Richard Bronson
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
Site24x7
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
Mohammed Adam
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
Sam Bowne
 
NetBeez - Integration with Cisco DNA Center
NetBeez - Integration with Cisco DNA CenterNetBeez - Integration with Cisco DNA Center
NetBeez - Integration with Cisco DNA Center
NetBeez, Inc.
 

Similar to Configuring linksys wireless router (20)

Chapter
ChapterChapter
Chapter
 
802.11n wireless router enhwi n3-encore_electronics
802.11n wireless router enhwi n3-encore_electronics802.11n wireless router enhwi n3-encore_electronics
802.11n wireless router enhwi n3-encore_electronics
 
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdfQRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
 
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementWebinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
 
Caravan park and campground WiFi hotspot Do it yourself
Caravan park and campground WiFi hotspot   Do it yourselfCaravan park and campground WiFi hotspot   Do it yourself
Caravan park and campground WiFi hotspot Do it yourself
 
CAHs Using Health Information Technology
CAHs Using Health Information TechnologyCAHs Using Health Information Technology
CAHs Using Health Information Technology
 
Mersive Solstice & the Corporate Enterprise Network
Mersive Solstice & the Corporate Enterprise NetworkMersive Solstice & the Corporate Enterprise Network
Mersive Solstice & the Corporate Enterprise Network
 
Manual repetidor wi fi
Manual repetidor wi fiManual repetidor wi fi
Manual repetidor wi fi
 
Ids in wn
Ids in wnIds in wn
Ids in wn
 
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
 
CableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home NetworkCableTap - Wirelessly Tapping Your Home Network
CableTap - Wirelessly Tapping Your Home Network
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
Qig di 604
Qig di 604Qig di 604
Qig di 604
 
Richard Bronson Full Resume 2015
Richard Bronson Full Resume 2015Richard Bronson Full Resume 2015
Richard Bronson Full Resume 2015
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
NetBeez - Integration with Cisco DNA Center
NetBeez - Integration with Cisco DNA CenterNetBeez - Integration with Cisco DNA Center
NetBeez - Integration with Cisco DNA Center
 
5 steps
5 steps5 steps
5 steps
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Configuring linksys wireless router

  • 2. 2 Main Issues • Physical Connection • Interfacing with the broad band Modem (cable, DSL) • Adjusting the configuration on the broad band Modem and upgrading the modem firmware. • Basic router setup – Accessing the Web Interface – Upgrading the router firmware – Admin account – IP addresses
  • 3. 3 Main Issues • Wireless Setup – SSID – Channel – Security – MAC Filter • Firewall • Work Station Configurations: – IP address – XP Firewall – Testing
  • 4. 4 Broad Band Modem • Before you connect your wireless router, do the following while your PC is connected directly to your broad band router. • Updating Firmware: “Click on Modem Firmware Update” • DSL Help – Bridging Instructions – Linksys Router Config.
  • 5. 5 Connect the router to your Modem: Physical Setup For more information read: Wireless Quick Start Guide Must be the cable that came with your modem (it is cross- over in case of DSL) Straight- Through Cable Check the “Internet” LED in the front Side Restart Everything before you test
  • 6. 6 Router • Tech Support • Search by answer ID for any of those issues – Setting up PPPoE DSL with a BEFW11S4: Answer ID 527
  • 7. 7 Wireless Router Web Access Leave the user name blank. Password is admin
  • 8. 8 Main Menus and Sub Menus A Main Menu Item Sub-Menu Items for the “Setup” menu Wireless Router Model # Firmware Version
  • 9. 9 “Basic Setup” Sub-Menu Router to Modem setup Router’s IP Address Disable DHCP, It is safer to use Static IPs Take a note of the DNS Server Addresses Save Help
  • 10. 10 Configure your PC and test • Configure your PC’s TCP/IP properties (Do this on a wired PC first. We will deal with Wireless PCs later): – IP address – Subnet Mask – Default Gateway – Primary DNS Server Address – Secondary DNS Server Address • Open your browser and test the Connection
  • 12. 12 Also in the “Management” Sub- Menu: UPnP Universal Plug and Play has to be enabled for some applications (MS Messenger audio and video for example) to work
  • 13. 13 Before You Start Update The Router Firmware Browse to where you have downloaded the router firmware from the vendor web site
  • 14. 14 Before You Start Update The Wireless NIC Driver • Gather information about: – Your wireless NIC (model number, etc…) – Operating system (Win XP, etc…) • Visit the manufacture web site, go to the tech support page and download the dirver • Install the driver • This insures that you will be able to configure the latest security features
  • 15. 15 Configuring the Radio Interface Enable the radio interface, configure the SSID and disable SSID Broadcasting
  • 16. 16 Configure WEP Key Make sure that you right down the automatically generated 26 hex digits key. The hex key will be used later to configure the wireless clients
  • 18. 18 MAC Authentication To get the MAC address of your Wireless card, Go to DOS and type “ipconfig /all
  • 21. 21 Configuring the Wireless Client • Depends on the configuration utility of your card.
  • 23. 23 Public IP address and DNS Info.
  • 24. 24 Examining the Log File Must download and install the log viewer application from Linksys web site Where the log file will be stored Choose
  • 25. 25 Log Viewer You can also open the log file in MS Word
  • 26. 26 Setting up the Client WEP 64, or 128 bit Match the SSID on AP (Case Sensitive) Both must be checked for WPA
  • 29. 29 XP Firewall • Troubleshooting Windows Firewall in Microsoft Windows XP Service Pack 2 • The document includes detailed explanation of how to use the following Windows Firewall Troubleshooting Tools: – Netsh firewall commands – Windows firewall logging files – The netstat tool • Most of the firewall configuration can also be done from the CLI. Example: – >netsh firewall set port opening TCP 80 disable