Lo 3 Ok
Lo 3 Ok
Lo 3 Ok
Pre-Test LO 2
I. DIRECTIONS: Arrange the following procedures. Label your answer in ascending order.
A. Configuring a Router.
______ Assign the router a new username and password.
______ Connect your router to your computer and your modem.
______ Enter in your router’s address.
______ Enter in your username and password.
______ Open a web browser.
______ Reset your router if you can’t access it.
II. IDENTIFICATION: Identify what is being asked. Choose your answer in the box provided.
Objectives:
3.1 Configure client device systems settings in accordance with manufacturer’s instructions
and end user preference
3.2 Configure LAN in accordance with manufacturer’s instructions and network design
3.3 Configure WAN in accordance with manufacturer’s instructions and network design
3.4 Configure wireless settings in accordance with manufacturer’s instructions, network
design, and end-user preferences
3.5 Configure security/firewall/advanced settings in accordance with manufacturers
instruction and end-user preference
Step 7:
Configure your PC to the network manually, if you modem isn't
connected that with the options mentioned above.
Step 9: Click ‘OK”. This will enable you to know if the local area
connection is connected or disconnected.
Step 3: Save or Apply the rule. Your router will process for a few
moments, and then the changes will be applied. Your program will
now be able to access the open port for the computer you
specified.
Windows
Firewall with Advanced
Security is a
management snap-in
for the Windows
Firewall from which you
In order to access it, you need to open the Windows Firewall as shown in the previous
lesson and then click or tap the “Advanced settings” link on the column on the left.
In Windows Firewall with Advanced Security you will encounter three important types
of rules:
Inbound rules – they apply to traffic that is coming from the network or the Internet to your
Windows computer or device. For example, if you are downloading a file through BitTorrent,
the download of that file is filtered through an inbound rule.
Outbound rules – these rules apply to traffic that is originating from your computer and going
to the network and the Internet. For example, your request to load the How-To Geek website
in your web browser is outbound traffic and it is filtered through an outbound rule. When the
website is downloaded and loaded by your browser, this is inbound traffic.
Connection security rules –less common rules that are used to secure the traffic between two
specific computers while it crosses the network. This type of rule is used in very controlled
environments with special security requirements. Unlike inbound and outbound rules which
are applied only to your computer or device, connection security rules require both computers
involved in the communication to have the same rules applied.
All the rules can be configured so that they are specific to certain computers, user
accounts, programs, apps, services, ports, protocols, or network adapters.
You
will see lots of inbound and outbound rules. Some rules will have a green checkmark near their
name while others will have a gray one. The rules with the green checkmark are enabled,
meaning that they are used by Windows Firewall. Those with a gray checkmark are disabled
and they are not used by Windows Firewall.
Windows Firewall rules have the following parameters that can be edited:
What Can Be Monitored from the Windows Firewall with Advanced Security
Beneath the three types of rules mentioned earlier, you will find a section named
“Monitoring.” If you expand it, you can view the active firewall rules, the active connection
security rules, and view the active security associations.
The first thing you should keep in mind when working with the rules that are built into
the Windows Firewall is that it is better to disable a rule than delete it. In case you do
something ill-advised, then it is very easy to repair everything by re-enabling disabled rules.
Rules which get deleted cannot be recovered unless you restore all the Windows Firewall
settings to their defaults.
To disable a rule, first select it and then press “Disable Rule” on the column on the right.
If you want to edit a rule and the way it works, you can do so by double-clicking on it,
selecting it, and then pressing “Properties” in the column on the right or right-clicking on it and
selecting “Properties.”
All the parameters we have mentioned earlier in this lesson can be modified in the
“Properties” window of that rule.
Creating rules in Windows Firewall with Advanced Security is easier than you
would think and it involves using a friendly wizard. To illustrate, let’s create an
outbound rule that blocks access to the network and the Internet for Skype, only
when you are connected to untrusted public networks.
Depending on what you have chosen at the previous step, you are now asked
to select the program or the ports that you want to add to the rule.
For our example, we have selected the executable of the program that we
want to block – Skype.exe. When you’ve finished setting things up, press “Next.”
Allow the connection – this includes both secure and insecure connections
Allow the connection if it is secure – the connection is allowed only if it is made
through a secure channel. You can specify the kind of authentication and
encryption you want applied by pressing “Customize”
Block the connection – blocks the connection, whether it is secure or not
For our example we have selected “Block the connection” and pressed “Next.”
Domain – the rule is applied only when the computer is connected to a network
domain
Private – the rule is applied only when the computer is connected to trusted
private networks
Public – the rule is applied only when the computer is connected to untrusted
public networks
For our example we have chosen “Public” because we wanted to block access only
when the computer is connected to untrusted public networks.
Press “Finish” and the rule is created and used by the Windows Firewall.
To explain, we have created a rule which blocks all inbound traffic made using the
TCP protocol on the port 30770. At the first step we selected “Program” and pressed
“Next.”
Now we are asked to select the protocol for which the rule applies and the
port. The choices for protocols are TCP and UDP. If you want a rule that applies to
both, you need to create two rules, one for each protocol.
Then, we had the choice to block all ports or only specific ones. We selected
“Specific local ports”, entered “30770,” and pressed “Next.”
Finally, enter the name and the description for the newly created rule and press
“Finish.”
The rule has been created and it is now used by the Windows Firewall.
If you have fiddled too much with the rules in Windows Firewall and things have started
to work incorrectly, you can easily undo all your settings and restore Windows Firewall to its
defaults. This can be done only for an administrator account.
To do this, open the Windows Firewall and from the left column, click or tap “Restore defaults.”
You are now informed of what this resetting will do, when you’re ready, press “Reset
defaults.”
You are back to the “Windows Firewall” window. All its settings have been reset to the
defaults as if your Windows installation were brand new. You can now reconfigure its settings
from scratch and hopefully solve your problems.
REFERENCES
https://www.deped.gov.ph/wp-content/uploads/2019/01/Computer-Systems-Se
rvicing-NC-II-CG.pdf
https://tesda.gov.ph/Download/Training_Regulations?Searchcat=Training%20Re
gulations
https://pyramidsolutions.com/network-connectivity/blog-nc/what-is-network-connectiv
ity/
https://www.wikihow.com/Configure-Local-Network-Area
https://www.wikihow.com/Configure-a-Router
https://www.howtogeek.com/school/windows-network-security/lesson5/
POST-TEST
I. DIRECTIONS: Arrange the following procedures. Label your answer in ascending order.
A. Configuring a Router.
______ Assign the router a new username and password.
______ Connect your router to your computer and your modem.
______ Enter in your router’s address.
______ Enter in your username and password.
______ Open a web browser.
______ Reset your router if you can’t access it.
II. IDENTIFICATION: Identify what is being asked. Choose your answer in the box provided.