How to Enable Regedit. In normal situations, administrator accounts should always have access to the Registry Editor on a Windows computer. If you get a message. Fix Most Windows Errors and Problems With Tweaking.Com Windows Repair 3.9.33 (Video) Random Photo: Guardian of the Five Boroughs Random Photo: Evidence of a Great Night. Two methods exist for setting up a wireless connection on Vista. This guide assumes your Wi-Fi router or access point is already setup and running on the Network and. Thanks for choosing OpenDNS! To get started, you’ll need to set up one or more of your devices to use OpenDNS’s DNS nameservers. For instructions on how to do. CCENT/CCNA ICND1 1. Official Cert Guide Premium Edition and Practice Tests. Sample Pages. Download the sample pages (includes Chapter 2. Index of main book)Table of Contents. Introduction xxxiv. Your Study Plan 2. Part I Networking Fundamentals 1. Chapter 1 Introduction to TCP/IP Networking 1. Do I Know This Already?” Quiz 1. Foundation Topics 1. Perspectives on Networking 1. TCP/IP Networking Model 1. History Leading to TCP/IP 1. Overview of the TCP/IP Networking Model 2. TCP/IP Application Layer 2. TCP/IP Transport Layer 2. TCP/IP Network Layer 2. TCP/IP Link Layer (Data Link Plus Physical) 2. TCP/IP Model and Terminology 3. OSI Networking Model 3. Comparing OSI and TCP/IP 3. Describing Protocols by Referencing the OSI Layers 3. OSI Layers and Their Functions 3. OSI Layering Concepts and Benefits 3. OSI Encapsulation Terminology 3. Chapter 2 Fundamentals of Ethernet LANs 3. Do I Know This Already?” Quiz 3. Foundation Topics 4. An Overview of LANs 4. Typical SOHO LANs 4. Typical Enterprise LANs 4. The Variety of Ethernet Physical Layer Standards 4. Consistent Behavior over All Links Using the Ethernet Data Link Layer 4. Building Physical Ethernet Networks with UTP 4. Transmitting Data Using Twisted Pairs 4. Breaking Down a UTP Ethernet Link 4. UTP Cabling Pinouts for 1. BASE- T and 1. 00. BASE- T 4. 8 UTP Cabling Pinouts for 1. BASE- T 5. 1Sending Data in Ethernet Networks 5. Ethernet Data- Link Protocols 5. Sending Ethernet Frames with Switches and Hubs 5. Chapter 3 Fundamentals of WANs 6. Do I Know This Already?” Quiz 6. Foundation Topics 6. Leased- Line WANs 6. Fix Most Windows Errors and Problems With Tweaking.Com Windows Repair 3.9.33 (Video) Random Photo: Now That's a Strong Storm! Random Photo: Don't Make Me Axe You Again. Positioning Leased Lines with LANs and Routers 6. Physical Details of Leased Lines 6. Data- Link Details of Leased Lines 6. Ethernet as a WAN Technology 6. Ethernet WANs that Create a Layer 2 Service 7. How Routers Route IP Packets Using Ethernet Emulation 7. Accessing the Internet 7. The Internet as a Large WAN 7. Internet Access (WAN) Links 7. Digital Subscriber Line 7. Cable Internet 7. So what can you do to monitor and identify if someone is wondering around on your home network? You can use some simple tools, when combined, will help you see your. Thanks to Stanford Ph.D. Chapter 4 Fundamentals of IPv. Addressing and Routing 7. Do I Know This Already?” Quiz 7. Foundation Topics 8. Overview of Network Layer Functions 8. Network Layer Routing (Forwarding) Logic 8. How Network Layer Routing Uses LANs and WANs 8. IP Addressing and How Addressing Helps IP Routing 8. Routing Protocols 8. IPv. 4 Addressing 8. Rules for IP Addresses 8. Rules for Grouping IP Addresses 8. IP Subnetting 9. 1IPv. Routing 9. 3 IPv. Host Routing 9. 3 Router Forwarding Decisions and the IP Routing Table 9. IPv. 4 Routing Protocols 9. Other Network Layer Features 9. Using Names and the Domain Name System 9. The Address Resolution Protocol 9. ICMP Echo and the ping Command 1. Chapter 5 Fundamentals of TCP/IP Transport and Applications 1. Do I Know This Already?” Quiz 1. Foundation Topics 1. TCP/IP Layer 4 Protocols: TCP and UDP 1. Transmission Control Protocol 1. User Datagram Protocol 1. TCP/IP Applications 1. Uniform Resource Identifiers 1. Finding the Web Server Using DNS 1. Transferring Files with HTTP 1. How the Receiving Host Identifies the Correct Receiving Application 1. Part I Review 1. 20. Part II Implementing Basic Ethernet LANs 1. Chapter 6 Using the Command- Line Interface 1. Do I Know This Already?” Quiz 1. Foundation Topics 1. Accessing the Cisco Catalyst Switch CLI 1. Cisco Catalyst Switches 1. Accessing the Cisco IOS CLI 1. CLI Help Features 1. The debug and show Commands 1. Configuring Cisco IOS Software 1. Configuration Submodes and Contexts 1. Storing Switch Configuration Files 1. Copying and Erasing Configuration Files 1. Chapter 7 Analyzing Ethernet LAN Switching 1. Do I Know This Already?” Quiz 1. Foundation Topics 1. LAN Switching Concepts 1. Overview of Switching Logic 1. Forwarding Known Unicast Frames 1. Learning MAC Addresses 1. Flooding Unknown Unicast and Broadcast Frames 1. Avoiding Loops Using Spanning Tree Protocol 1. LAN Switching Summary 1. Verifying and Analyzing Ethernet Switching 1. Demonstrating MAC Learning 1. Switch Interfaces 1. Finding Entries in the MAC Address Table 1. Managing the MAC Address Table (Aging, Clearing) 1. MAC Address Tables with Multiple Switches 1. Chapter 8 Configuring Basic Switch Management 1. Do I Know This Already?” Quiz 1. Foundation Topics 1. Securing the Switch CLI 1. Securing User Mode and Privileged Mode with Simple Passwords 1. Securing User Mode Access with Local Usernames and Passwords 1. Securing User Mode Access with External Authentication Servers 1. Securing Remote Access with Secure Shell 1. Enabling IPv. 4 for Remote Access 1. Host and Switch IP Settings 1. Configuring IPv. 4 on a Switch 1. Configuring a Switch to Learn Its IP Address with DHCP 1. Verifying IPv. 4 on a Switch 1. Miscellaneous Settings Useful in Lab 1. History Buffer Commands 1. The logging synchronous, exec- timeout, and no ip domain- lookup Commands 1. Chapter 9 Configuring Switch Interfaces 1. Do I Know This Already?” Quiz 1. Foundation Topics 1. Configuring Switch Interfaces 1. Configuring Speed, Duplex, and Description 1. Configuring Multiple Interfaces with the interface range Command 1. Administratively Controlling Interface State with shutdown 1. Removing Configuration with the no Command 1. Autonegotiation 1. Port Security 2. 02 Configuring Port Security 2. Verifying Port Security 2. Port Security Violation Actions 2. Port Security MAC Addresses as Static and Secure but Not Dynamic 2. Part II Review 2. Part III Ethernet LANs: Design, VLANs, and Troubleshooting 2. Chapter 1. 0 Analyzing Ethernet LAN Designs 2. Do I Know This Already?” Quiz 2. Foundation Topics 2. Analyzing Collision Domains and Broadcast Domains 2. Ethernet Collision Domains 2. Ethernet Broadcast Domains 2. Analyzing Campus LAN Topologies 2. Two- Tier Campus Design (Collapsed Core) 2. Three- Tier Campus Design (Core) 2. Topology Design Terminology 2. Analyzing LAN Physical Standard Choices 2. Ethernet Standards 2. Choosing the Right Ethernet Standard for Each Link 2. Wireless LANs Combined with Wired Ethernet 2. Chapter 1. 1 Implementing Ethernet Virtual LANs 2. Do I Know This Already?” Quiz 2. Foundation Topics 2. Virtual LAN Concepts 2. Creating Multiswitch VLANs Using Trunking 2. Forwarding Data Between VLANs 2. VLAN and VLAN Trunking Configuration and Verification 2. Creating VLANs and Assigning Access VLANs to an Interface 2. VLAN Trunking Protocol 2. VLAN Trunking Configuration 2. Implementing Interfaces Connected to Phones 2. Chapter 1. 2 Troubleshooting Ethernet LANs 2. Do I Know This Already?” Quiz 2. Foundation Topics 2. Perspectives on Applying Troubleshooting Methodologies 2. Troubleshooting on the Exams 2. A Deeper Look at Problem Isolation 2. Troubleshooting as Covered in This Book 2. Analyzing Switch Interface Status and Statistics 2. Interface Status Codes and Reasons for Nonworking States 2. Interface Speed and Duplex Issues 2. Common Layer 1 Problems on Working Interfaces 2. Predicting Where Switches Will Forward Frames 2. Predicting the Contents of the MAC Address Table 2. Analyzing the Forwarding Path 2. Analyzing Port Security Operations on an Interface 2. Troubleshooting Shutdown Mode and Err- disabled Recovery 2. Troubleshooting Restrict and Protect Modes 2. Analyzing VLANs and VLAN Trunks 2. Ensuring That the Right Access Interfaces Are in the Right VLANs 2. Access VLANs Not Being Defined 2. Access VLANs Being Disabled 2. Mismatched Trunking Operational States 2. Part III Review 2. Part IV IP Version 4 Addressing and Subnetting 3. Chapter 1. 3 Perspectives on IPv. Subnetting 3. 02“Do I Know This Already?” Quiz 3. Foundation Topics 3. Introduction to Subnetting 3. Subnetting Defined Through a Simple Example 3. Operational View Versus Design View of Subnetting 3. Analyze Subnetting and Addressing Needs 3. Rules About Which Hosts Are in Which Subnet 3. Determining the Number of Subnets 3. Determining the Number of Hosts per Subnet 3. One Size Subnet Fits All–Or Not 3. Make Design Choices 3. Choose a Classful Network 3. Choose the Mask 3. Build a List of All Subnets 3. Plan the Implementation 3. Assigning Subnets to Different Locations 3. Choose Static and Dynamic Ranges per Subnet 3. Chapter 1. 4 Analyzing Classful IPv. Networks 3. 26“Do I Know This Already?” Quiz 3. Foundation Topics 3. Classful Network Concepts 3. IPv. 4 Network Classes and Related Facts 3. Number of Hosts per Network 3. Deriving the Network ID and Related Numbers 3. Unusual Network IDs and Network Broadcast Addresses 3. Practice with Classful Networks 3. Practice Deriving Key Facts Based on an IP Address 3. Practice Remembering the Details of Address Classes 3. Additional Practice for This Chapter’s Processes 3. Answers to Earlier Practice Problems 3. Chapter 1. 5 Analyzing Subnet Masks 3. Do I Know This Already?” Quiz 3. Foundation Topics 3. Subnet Mask Conversion 3. Three Mask Formats 3. Converting Between Binary and Prefix Masks 3. Converting Between Binary and DDN Masks 3. Converting Between Prefix and DDN Masks 3. Practice Converting Subnet Masks 3. Identifying Subnet Design Choices Using Masks 3. Masks Divide the Subnet’s Addresses into Two Parts 3. Masks and Class Divide Addresses into Three Parts 3. Classless and Classful Addressing 3. Calculations Based on the IPv. Address Format 3. Practice Analyzing Subnet Masks 3. Additional Practice for This Chapter’s Processes 3. Answers to Earlier Practice Problems 3. Chapter 1. 6 Analyzing Existing Subnets 3. Do I Know This Already?” Quiz 3. Foundation Topics 3. Defining a Subnet 3. An Example with Network 1. Four Subnets 3. 58 Subnet ID Concepts 3. Subnet Broadcast Address 3. Range of Usable Addresses 3. Analyzing Existing Subnets: Binary 3. Finding the Subnet ID: Binary 3. Finding the Subnet Broadcast Address: Binary 3. Binary Practice Problems 3. Shortcut for the Binary Process 3. Brief Note About Boolean Math 3. Finding the Range of Addresses 3. Analyzing Existing Subnets: Decimal 3. Analysis with Easy Masks 3. Predictability in the Interesting Octet 3. Finding the Subnet ID: Difficult Masks 3. Finding the Subnet Broadcast Address: Difficult Masks 3. Practice Analyzing Existing Subnets 3. A Choice: Memorize or Calculate 3. Additional Practice for This Chapter’s Processes 3. Answers to Earlier Practice Problems 3. Part IV Review 3. How To Tell If Someone Is On Your Wireless Home Network. You heard the old saying . Well, the same can be said about your Wireless Home Network. Have you ever wondered if someone else is on your network, with out your knowledge, watching every site you visit or stealing account information from your GMail or bank account? Sure you probably went to great lengths to implement and secure your wireless home network, but any Network Security professional will tell you NOTHING is bullet proof. While nothing is bullet proof, being proactive with monitoring can catch the un- wanted guest. Other tools exist than described in this article, but the goal is to show you the different type of tools and how to use them. Firewall Logs – is a good place to start. If you have a Firewall running on your Computer or on your router, look for suspicious activity by scanning the logs for anything out of the ordinary with inbound and outbound traffic. One method you can use is to look for patterns. For example, if someone was scanning your computer to see what ports are open, the logs will show continuous activity from the same IP Address (an intruder's computer) sending a stream of data to many different ports to a single IP Address or range of IP Addresses. Obviously, with a smart hacker, they can do many things to cover their tracks, but one thing is for sure, data must be transmitted to probe your computer, and patterns is one method to use for spotting trouble on your Network. DHCP Logs – if the unwanted guest is not Network savvy, or security on your router is not up to snuff, they may be able to drop in unannounced, by receiving an IP Address from your wireless DHCP server. You can easily view a list of active addresses by connecting to your router and checking the DHCP log. For example, on my Linksys router, the log is located in the Wireless MAC Filter tab and is shown in the screen shot below. I can see and identify all active PC's on my Network. But this does not guarantee that these are the only active PC's on my Network. Why? Unfortunately, a more sophisticated hacker can get around the need to rely on DHCP. If they did their homework (you can be sure of that), they probably figured out the range of IP Addresses in use on your Network, found an unused address in that range and configure their PC with the static address. Check Who's Connecting To Your Computer – Now that you identified the trusted computers are on your network (from the DHCP logs), you can check who is connected to your computer. To do this, open a command prompt and enter the following command: netstat - anwhere: a = Displays all connections and listening portsn = Displays addresses and port numbers in numerical form. Netstat is a useful tool that displays network connections (both incoming and outgoing) on computers. This will allow you to see all IP Addresses that have made a connection to your computer. Netstat shows you the type of connection (TCP or UDP), IP Address and port number (number after addresses separated by a colon) for both Local (your computer) and Foreign addresses. To find your IP Address, just enter ipconfig at the command prompt. You should be able to easily spot any addresses (Foreign column) that is outside the DHCP range on your router and investigate. You can also see what executable are involved in creating each connection by using the - b switch with the netstat command (netstat - b)Now this great for checking connections on your Compter, but what if someone is on your Network and not connected to your Computer? Scanning your entire Network – When Computers communicate with each other, they do so with ports (as you saw with the netstat command). Some ports that may be familiar to you are 8. HTTP), 4. 43 (SSL). SMTP), 1. 10 (POP). For example, when your Computer browses a website, it opens up port 8. To see open ports on a Computer, a tool called Port Scanner can be used that can scan a Network and identify devices by probing for open ports. Information that can be found is the connection type (TCP or UDP), type of port and IP Address. Many Port Scanners exist, such as Advanced Port Scanner (Famatech Software) and can scan a range of IP Addresses as shown in the screen shot below. By scanning a range of IP Addresses, you can quickly see who is on your Wireless Network what they are doing from the list of open ports. You can easily find out the entire range of addresses (including addresses outside the DHCP scope) your router uses. To do that, connect to your wireless router administration of interface and look for the router subnet mask information. On a typical Linksys router (above screen shot), the default setting for the subnet mask is 2. Using a subnet mask calculator you can determine the range of IP Address that can be used on your Network. For example, the subnet mask of 2. IP address of the router – 1. Class C) has an IP address range of 1. If you are one if them, I welcome you comments and suggestions to provide us with more tips and suggestions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2018
Categories |