Download 70-687 8.1 Lecture Slides Lesson 10

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Mobile security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Distributed firewall wikipedia , lookup

Network tap wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Wireless security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
Lesson 10: Configuring
Network Settings
MOAC 70-687: Configuring Windows 8.1
Overview
• Exam Objective 3.1: Configure IP settings
o Configure name resolution
o Connect to a network
o Configure network locations
© 2013 John Wiley & Sons, Inc.
2
Connecting to Wireless
Networks
Lesson 10: Configuring Network Settings
© 2013 John Wiley & Sons, Inc.
3
Connecting to Wireless
Networks
• The process for connecting a Windows 8
computer to a wireless network is very simple
when
• the network is broadcasting its service set
identifier (SSID) .
• The SSID is the name for the wireless network.
• Any wireless network that is broadcasting its
name appears in the list of available
networks in Windows 8.1.
© 2013 John Wiley & Sons, Inc.
4
Connecting to Wireless Networks
Selecting the wireless network icon
© 2013 John Wiley & Sons, Inc.
5
Connecting to Wireless
Networks
• If you need to connect to a wireless network that is not
broadcasting its SSID, the process is a little more
involved.
• Because the network is not broadcasting, it does not
appear in the list of available networks. This means you
have to enter information such as the network’s SSID
(network name), security type, encryption type and
security key to connect to it.
• Because the network does not appear on your network
list, you must connect to it by using the Network and
Sharing Center.
• The Network and Sharing Center provides a central
location for network configuration controls (changing
settings, managing wireless networks, network sharing
settings).
© 2013 John Wiley & Sons, Inc.
6
Connecting to Wireless Networks
The Manually connect to a wireless network page
© 2013 John Wiley & Sons, Inc.
7
Understanding Wireless
Security
• Wireless networks are subject to many of the
same security threats as cabled networks, but
the medium they use makes it easier for
attackers to penetrate them.
• Some of the specific types of attacks to which
an unsecured wireless network is subject are:
o
o
o
o
o
Eavesdropping
Masquerading
Attacks against wireless clients
Denial of service
Data tampering
© 2013 John Wiley & Sons, Inc.
8
Evaluating Wireless
Networking Hardware
• The 802.11 standards published by the IEEE
dictate the frequencies, transmission
speeds, and ranges of wireless networking
products.
• The two main security protocols used in
wireless LAN devices:
o Wired Equivalent Privacy (WEP)
o WiFi Protected Access (WPA and WPA2)
© 2013 John Wiley & Sons, Inc.
9
IEEE Wireless
Networking Standards
© 2013 John Wiley & Sons, Inc.
10
Using Wired Equivalent
Privacy
• WEP is a wireless security protocol that helps
protect transmitted information by using a
security setting, called a shared secret or a
shared key, to encrypt network traffic before
sending it.
• To use WEP, administrators must configure all of
the devices on the wireless network with the
same shared secret key.
• The cryptography used by WEP is relatively
weak, and programs that can analyze
captured traffic and derive the key from it are
readily available.
© 2013 John Wiley & Sons, Inc.
11
Selecting an
Authentication Method
• The initial WEP standards provided for two
types of computer authentication:
o Open system enables any client to connect
without providing a password
o Shared secret requires wireless clients to
authenticate by using a secret key
© 2013 John Wiley & Sons, Inc.
12
Using Wi-Fi Protected
Access
• To address the weaknesses of WEP, the Wi-Fi
Alliance developed Wi-Fi Protected Access
(WPA).
• There are two encryption options for WPA:
o Temporal Key Integrity Protocol (TKIP)
o Advanced Encryption System (AES)
• In its current form, WPA has two operational
modes:
o WPA2-Personal
o WPA2-Enterprise
© 2013 John Wiley & Sons, Inc.
13
Service Set Identifier
(SSID)
• The SSID is the name for the wireless network.
• Any wireless network that is broadcasting its
name appears in the list of available
networks in Windows 8.1.
• If you hold your mouse over the network
name without clicking, you can see the
security type (e.g., WEP, WPA2) used and
the wireless protocol required (e.g., 802.11g,
802.11n).
© 2013 John Wiley & Sons, Inc.
14
Managing Preferred
Wireless Networks
Lesson 10: Configuring Network Settings
© 2013 John Wiley & Sons, Inc.
15
Prioritizing Networks in
Windows 8.1
• Windows 8.1 determines the connection
priority automatically based on the type of
network you are connected to.
• The highest priority network is always an
Ethernet (wired) connection with Wi-Fi and
then mobile broadband networks preferred
when Ethernet is not available.
© 2013 John Wiley & Sons, Inc.
16
Select a Preferred Network
Connecting to a preferred network
© 2013 John Wiley & Sons, Inc.
17
Removing Wireless
Networks / Profiles
• A wireless profile is a file in Windows 8.1 that
stores information about a wireless network
that you use on a repeated basis.
• To view all wireless profiles currently stored
on your computer, from a command
prompt, type the following and then press
Enter:
netsh wlan show profiles
© 2013 John Wiley & Sons, Inc.
18
Removing Wireless
Networks / Profiles
• To delete a wireless profile that is no longer
within range, from a command prompt,
type the following and press Enter. Be sure to
replace <profile name> with the actual
name of the profile you want to remove:
netsh wlan delete profile name=”<profile
name>”
© 2013 John Wiley & Sons, Inc.
19
Configuring Network
Adapters
Lesson 10: Configuring Network Settings
© 2013 John Wiley & Sons, Inc.
20
Network Adapters
• A network adapter (network interface card
(NIC), Ethernet adapter, wireless adapter,
Wi-Fi card) is the hardware component used
to connect your Windows 8.1 computer to a
wired or wireless network.
• The easiest way to access the configuration
settings for a network adapter is to use the
Network and Sharing Center.
• To configure the network adapter click the
Change adapter settings link.
© 2013 John Wiley & Sons, Inc.
21
Configuring Network Adapters
The Network Connections dialog box
© 2013 John Wiley & Sons, Inc.
22
Configuring Network Adapters
The advanced configuration options for a wireless
network adapter
© 2013 John Wiley & Sons, Inc.
23
Configuring Network Adapters
Advanced configuration options for a wired network
adapter
© 2013 John Wiley & Sons, Inc.
24
Network Adapter Modes
• When working in ad hoc mode, you are
configuring the wireless network adapter to
connect to other computers who are also
using wireless network adapters.
• You can also configure the wireless network
adapter to work in infrastructure mode. In
infrastructure mode, the wireless network
adapter is configured to connect to other
computers through a wireless access point.
© 2013 John Wiley & Sons, Inc.
25
Configuring LocationAware Printing
Lesson 10: Configuring Network Settings
© 2013 John Wiley & Sons, Inc.
26
Location-Aware Printing
• Windows 8.1 has a featured called locationaware printing that can make the process of
moving between networks and connecting to
printers much simpler.
• Location-aware printing, works by telling
Windows 8.1 Pro to update and select the
default printer based on the currently
connected network.
• Location-aware printing depends upon the
Network Location Awareness service and the
Network List Service to determine network
information.
© 2013 John Wiley & Sons, Inc.
27
Configuring LocationAware Printing
• To configure location-aware printing, you:
o Must be running a laptop computer with
Windows 8.1 Pro or later.
o Need to connect to printers on at least two
different networks.
© 2013 John Wiley & Sons, Inc.
28
Configure Location-Aware
Printing
The Manage default printers dialog box
© 2013 John Wiley & Sons, Inc.
29
Lesson Summary
• The IEEE dictates the frequencies, transmission speeds, and
ranges of wireless network products.
• The Wired Equivalent Privacy (WEP) and WiFi Protected Access
(WPA/WPA2) are the two main security protocols used in
wireless LAN devices.
• WiFi Protected Access was designed to address the
weaknesses of WEP and uses two encryption options:
Temporal Key Integrity Protocol (TKIP) and Advanced
Encryption System (AES).
• If a wireless network is broadcasting its SSID (network name)
and it is within range of your Windows 8.1 computer, it
appears in the list of available networks. You can simply click
the network and enter the appropriate security key to
connect.
© 2013 John Wiley & Sons, Inc.
30
Lesson Summary
• A wireless profile is a file that contains the wireless SSID, security
type and encryption type and security keys.
• If a wireless network is not broadcasting its SSID, you have to
enter information such as the network’s SSID, security type,
encrypting type and security key manually by going through
the Network and Sharing Center.
• Windows 8.1 automates the process of managing the
preferred network when it is within range. Unlike Windows 7
which allowed you to set the priority of one network over
another, Windows 8/8.1 determines the priority based on the
type of network you are connected to and the order in which
you connect to the network.
© 2013 John Wiley & Sons, Inc.
31
Lesson Summary
• If you do not want Windows 8.1 to automatically connect to a
network, you can use the Forget this network option if you are
currently in range or the netsh wlan delete profile
name=”<profile name>” command if the network is no longer
within range of your computer.
• Adhoc mode is used when you configure a wireless network
adapter to bypass a WAP and connect directly to other
wireless computers. Infrastructure mode is used when you
want the wireless adapter to connect to a WAP.
• Location-aware printing, available on Windows 8.1 computers
that have batteries only (e.g., laptops) allows you to configure
a default printer for each network you connect to.
© 2013 John Wiley & Sons, Inc.
32
Lesson Summary
• The Network Location Awareness services
and the Network List Service are required in
order for location-aware print to work. If
either of these two services is not
functioning, Windows 8.1 is not able to
detect changes in networks and cannot
adjust the default printer accordingly.
© 2013 John Wiley & Sons, Inc.
33
Copyright 2013 John Wiley & Sons, Inc..
All rights reserved. Reproduction or translation of this work beyond that
named in Section 117 of the 1976 United States Copyright Act without the
express written consent of the copyright owner is unlawful. Requests for
further information should be addressed to the Permissions Department, John
Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own
use only and not for distribution or resale. The Publisher assumes no
responsibility for errors, omissions, or damages, caused by the use of these
programs or from the use of the information contained herein.