04 CBLM Template DDD

Download as pdf or txt
Download as pdf or txt
You are on page 1of 67

COMPETENCY-BASED LEARNING MATERIALS

Sector : Electronics

Qualification Title : Computer Systems Servicing NC II

Unit of Competency : Set-up Computer Networks

Module Title : Setting up Computer Networks

IBA College of Mindanao


HOW TO USE THIS COMPETENCY-BASED LEARNING
MATERIALS

Welcome!
The unit of competency, “Setting up Computer Networks“, is one of
the competencies of COMPUTER SYSTEMS SERVICING NC II, a course
which comprises knowledge, skills and attitudes required for a TESDA
trainee to possess.
In this module, you are required to go through a series of learning
activities in order to complete each learning outcome. In each learning
outcome are Information Sheets, Self-Checks, Operation Sheets and
Task/Job Sheets. Follow and perform the activities on your own. If you
have questions, do not hesitate to ask for assistance from your facilitator.
Remember to:
• Work through all the information and complete the activities in
each section.
• Read information sheets and complete the self-check. Suggested
references are included to supplement the materials provided in
this module.
• Most problably, your trainer will also be your supervisor or
manager. He is there to support you and show you the correct
way to do things.
• You will be given plenty of opportunities to ask questions and
practice on the job. Make sure you practice your new skills
during regular work shifts. This way, you will improve your
speed, memory and your confidence.
• Use Self-Checks, Operations Sheet or Task or Job Sheets at the
end of each section to test your own progress. Use the
Performance Criteria Checklist or Procedural Checklist located
after the sheet to check your own performance.
• When you feel confident that you have sufficient practice, ask
your trainer to evaluate you. The results of your assessment will
be recorded in your Achievement Chart and Progress Chart.

You need to complete this module before you can perform the next
module.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 2 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
COMPUTER SYSTEMS SERVICING NC II

List of Competencies

No. Unit of Competency Module Title Code


Installing and
Install and Configure
1. Configuring ELC724331
Computer Systems
Computer Systems
Setting Up
Set-Up Computer Networks ELC724332
2. Computer Networks

Setting Up Computer
Set-Up Computer Servers ELC724333
3. Servers

Maintaining and
Maintain and Repair
Repairing Computer
Computer Systems and ELC724334
4. Systems and
Networks
Networks

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 3 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
MODULE CONTENT

Qualification Title : Computer Systems Servicing NC II


Unit of Competency : Set-up Computer Network
Module Title : Setting up Computer Networks

Introduction:
This unit covers the outcomes required in setting-up computers
networks for LANs and small-office home-office (SOHO) systems. It consists
of competencies to install network cables, set network configuration, set
router/Wi-Fi/ wireless access point/repeater configuration as well as to
inspect and test the configured computer networks.
Learning Outcomes:
At the end of this module you will be able to :
1. Install Network cables
2. Set network configuration
3. Set router /WI-FI / wireless access point / repeater
configuration
4. Inspect and test the configured computer networks

ASSESSMENT CRITERIA:
1.1 Cable routes are determined and planned in accordance with
network design and actual installation site.
1.2 Network materials necessary to complete the work are identified
and obtained in accordance with established procedures and
checked against systems requirements
1.3 Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
1.4 Appropriate personal protective equipment is used and OHS
policies and procedures are followed
1.5 Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA)
standards
1.6 Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
1.7 Installation work is performed and is checked to ensure no
unnecessary damage has occurred and complies with
requirements
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 4 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
1.8 OHS standards and 5S principles are followed according to
enterprise requirements
1.9 Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program.
2.1 Network connectivity of each terminal is checked in accordance
with network design.
2.2 Any fault or problem in the network system is diagnosed and
remedied in line with the standard operating procedures.
2.3 Network interface card (NIC) settings are configured in accordance
with network design.
2.4 Communication checking between terminals are carried out in
accordance with OS network configuration guides
2.5 Unplanned events or conditions are responded to in accordance
with established procedures
3.1 Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences
3.2 Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design
3.3 Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
3.4 Wireless settings are configured in accordance manufacturers’
instructions, network design and end-user preferences
3.5 Security/Firewall/Advance settings are configured in accordance
with manufacturers’ instructions and end-user preferences
4.1 Final inspections are undertaken to ensure that the configuration
done on the computer networks conforms with the manufacturer’s
instruction/manual
4.2 Computer networks are checked to ensure safe operation.
4.3 Reports are prepared/completed according to company
requirements.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 5 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
LEARNING OUTCOME #3 Set router/Wi-Fi/Wireless access
point/repeater configuration
CONTENTS:
1. Client Device Systems
2. LAN Configuration
3. WAN Configuration
4. Wireless Settings Configuration
5. Security/Firewall and Advanced Settings Configuration
ASSESSMENT CRITERIA:
1. Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences.
2. Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design.
3. Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design.
4. Wireless settings are configured in accordance with
manufacturers’ instructions and end-user preferences.
5. Security/Firewall/Advance settings are configured in accordance
with manufacturers’ instructions and end-user preferences
CONDITION:
The participants will have access to:
1. Workplace Location
2. Computer Network materials
a. UTP Cable
b. RJ45
c. Router/Hub
d. Modem
3. Personal Computer
4. Training Materials
a. Learning Packages
b. Bond papers
c. Ballpens
d. Whiteboard Marker

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 6 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
e. Manuals
f. Competency Standard
g. Training Regulations
ASSESSMENT METHOD:
1. Practical Demonstration w/ oral questioning
2. Interview
3. Third Party
4. Portfolio

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 7 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
LEARNING ACTIVITIES
Learning Outcome 3
Set Router/Wi-Fi/ Wireless Access Point/Repeater Configuration
Learning Activities Special Instructions
1.Read Information sheet 2.3-1 Read information sheet thoroughly.
on Client Device Systems After reading the learner is
encouraged to answer the self-check.
2.Answer Self Check 2.3-1 Compare answers to Answer Key
2.3-1
3.Read Information sheet 2.3-2 Read information sheet thoroughly.
on LAN Configuration After reading the learner is
encouraged to answer the self-check
4.Answer Self Check 2.3-2 Compare answers to Answer Key 2.3-2
5. Perform Job Sheet 2.3-2 on Compare Performance to checklist
Configure Local Area Network
6. Read Information sheet 2.3-3 Read information sheet thoroughly.
on WAN Configuration After reading the learner is
encouraged to answer the self-check.
7. Answer Self Check 2.3-3 Compare answers to answer key 2.3-3
8. Perform Job Sheet 2.3-3 on Compare Performance to checklist 2.3-
WAN configuration 3
9. Read Information sheet 2.3-4 Read information sheet thoroughly.
on Wireless Settings After reading the learner is
Configuration encouraged to answer the self-check
10. Answer Self Check 2.3-4 Compare answers to answer key 2.3-4
11. Read Information sheet 2.3- Read information sheet thoroughly.
5 on Security/Firewall Settings After reading the learner is encourage
Configuration to answer the self-check
12. Answer Self Check 2.3-5 Compare answers to answer key 2.3-5

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 8 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
INFORMATION SHEET 2.3-1
Client Device Systems

Learning Objectives:
After reading this Information Sheet, you should be able to:
1. Identify What is Client Device Systems
2. Configure Client Device Systems

Introduction
Client Device Settings is a way of configuring your client device by
which you can specify client settings at a collection level, allowing you to
define different settings as necessary. It has the characteristics of being
flexible to create multiple client device or client user settings and apply it to
different collections as per requirement. It is a set of default settings. But
always take note that those Client Device systems settings are configured in
accordance with manufacturers’ instructions and end-user preferences. In
this module, we will show the steps on setting up your client device on
Windows 7 & 10 which are configured manually.

Always take note on the following area’ s to be configured:


1. Set up Time and Date
2. Set up Computer Name
3. Install and Configure Network Driver
4. Install necessary software application e.i MS Office and Anti virus

Configure Client Device Systems


Steps on How to Configure Client Device Settings:
1. Setting up Time and Date
a. On Windows 10 OS, to set up the Time and Date go to the right
bottom of your taskbar see figure below:

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 9 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
b. Right click on the area of time and date then choose “Adjust
date/time”. Then the date/time settings will appear.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 10 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
c. If you wish to set your date/time automatically just click “ON”
at “Set Time Automatically”. If not, you can turn it off and be
the one to set date/time.
d. You could also set “Time Zone” it is located below change date
and time. You could choose Beijing, Kuala Lumpur or Taipei,
Philippines is none on the choices just choose a Time Zone that
much on our Time “UTC+8”.

2. Set up Computer Name


a. To setup your Computer Name, click on Start Menu and type
in “This PC” without quotes, and other Windows OS version
like Windows 7 or Windows XP, you can find it on the
Desktop a Computer Icon with a name of “My Computer”.
For Win10, please see figure below:

b. Then “Control Panel” for system will appear. Click on


“Change Settings” button that is highlighted below.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 11 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
c. After clicking “Change Settings”, System properties setup will
appear. You can now change the “Computer Name” by
clicking the “Change” button. As shown on figure below:

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 12 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Note: Setting up your Computer Name is important. This will serve as the
Identity of your computer. It will be useful when it comes on setting up your
Computer Network. The Server/The Network will identify what PC is being
connected or configured.

3. Install and Configure Network Driver


a. In every computer, it is necessary to install a network driver
so that your computer will have an access on every network
connection it may need. The first step to do is to select a
compatible network driver for your PC. You can use the
driver that is packed along with your computer or you can
simply download the correct network driver over the internet.
To search for a driver online, you need to know the brand
and exact model of your computer for example “Acer V5-
473PG network driver” in my case.
b. To make it easier, you can simply download the DriverPack
Solution software. This software automatically detects your
hardware and provide you the correct drivers to be installed.

After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection icon. You'll see this in your System Tray at bottom right corner
of you screen. Think of an IP address as a mailing address. Each computer
on the network needs a unique IP address so that information sent across
the network reaches the correct destination.

Click Open Network and Sharing Center.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 13 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Click on Ethernet tab then on related settings click “Change adapter
options”

Right click the Ethernet icon and click Properties.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 14 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck
it, just highlight it. Then click the properties button.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 15 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
By default, “Obtain an IP address automatically” radio button is selected
which means that our computer can obtains its IP address from the router
or from a network server. In our case we will provide our own IP address, so
we will select “Use the following IP address” radio button.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 16 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Type 192. 168. 1. 2 into the IP address field and 255.255.255.0 into the
Subnet mask field.

Type 192. 168. 1. 1 into the Default gateway field.


Take note that when you’re being ask about gateway technically it’s the IP
address of your router. Make sure that you know where you can find your
routers/access point IP address.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 17 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
For DNS server, you can leave this fields blank if you’re not connected to the
internet. And if in case you are connected to the internet, you can use the
Google’s open DNS which is 8.8.8.8. and 8.8.4.4.

Click OK. This will save the settings for that computer. This computer is
now configured on your network with a unique IP address.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 18 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Open the Internet Protocol Version 4 properties on the next computer.
Follow the steps above on the second computer to open the Internet Protocol
Version 4 (TCP/IPv4) Properties window. Make sure to put only a unique IP
address. So the first computers IP address is “192.168.1.2” then the
succeeding IP address would be “192.168.1.(3 - 255).

4. Install necessary software application e.i MS Office and Antivirus


a. You may install necessary software applications for your PC
like MS Office and an Antivirus. See figures below for
references:

If you do not have a previous version of Office installed, you


can download a copy of MS office online.

If you have any other version of Office on your


computer/laptop (i.e. Office 2013, Office 2010, Office 2007 or
even Office 365, etc.) you need to remove it before installing
Office 2016. This will help avoid potential clashes between
multiple versions. Screenshots for these steps were taken
with Windows 7, but the steps are generally the same for
Windows 10.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 19 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Download Office 2016

Follow the instructions below to download and install MS Office 2016, and
then follow the installation wizard instructions. Screenshots for these steps
were taken with Windows 7 and Internet Explorer. The steps are generally
the same for Windows 10 and with other web browsers.

1.Open your browser


Type: https://products.office.com/en/try
Click Office 365.

2. Click Get Started.

3. Click Install Office 365.

4. Click Install Now.

NOTE: There are some default options, such as making Bing your default
search engine, that are checked above the Install Now button. Review this
and uncheck as necessary

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 20 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Install Office 2016
5. Follow the steps to install Office.

Installation Steps:

Click Run.
Click Yes to begin installation.
Download my take a while, be patient.

Click Close after reviewing steps.

NOTE: The instructions above are for Internet Explorer, if using a different
browser see: Depending on your browser your pop-up will be different...

5.1 Depending on your browser, your pop-up will be different...

• Go to the install pop-up in the browser.

• Click Run (in Internet Explorer), Setup (in Chrome), or Save File (in
Firefox).

6. You will see a We're getting things ready...

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 21 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Please wait while Office prepares your Office.
7. The Office applications are identified.

8. The Office applications are installed.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 22 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Please be patient, the installation process will take a while.

9. Office Installation is complete.

Click Close.
10. Launch an Office 2016 application

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 23 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
11. Open any Office application to accept the Microsoft License
Agreement.

Click Accept.

CONGRATULATIONS!! You have successfully installed your


Microsoft Office 2016.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 24 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
How to Download and Install ESET Internet Security

1. Uninstall any previously installed antivirus software on your system.


2. If you have a CD, insert it into your computer (if the installation does
not begin automatically, click Start → Computer and double-click the
ESET disc icon).

To install without a CD:


a. Download the installer at
https://download.eset.com/com/eset/tools/installers/live_eis/l
atest/eset_internet_security_live_installer.exe
b. Double-click the installer file to begin installation.

3. In the Install ESET Internet Security window, click Continue.

Figure 1-1

4. Review the End-user license agreement and click I Accept.

Figure 1-2

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 25 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
5. In the I have a license window, click Enter a License Key. If you are
updating from a previous version, your license information will be
entered automatically.

Go to the link below if you do not have a License Key or did not receive
an email with license info following your purchase.

https://www.eset.com/us/support/lost-
license/?intcmp=%22KBCJ_3419_license%22

Figure 1-3

6. Type or copy/paste your License Key in the License Key field and
click Continue. Make sure you enter the License Key exactly as it
appears and include the hyphens. If you copy/paste be sure you do
not accidentally select additional space around the text. If you have a
CD, type your Activation Key (printed on the label) in the blank field.
Be sure to include the hyphens.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 26 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Figure 1-4

7. Click Continue. You have the option to install a different product in


this step, however doing so will keep you from using all of the features
in ESET Internet Security.

Figure 1-5

8. Select your preference for ESET Live Grid and Detection of Potentially
Unwanted Applications. Click Install.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 27 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Figure 1-6

9. Click Done to exit the Installation Wizard.

Figure 1-7

10. ESET Internet Security is now installed and fully functional.


You will be prompted to set up additional security tools. Click for help
to setup Parental Control and Anti-Theft.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 28 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Figure 1-8

Your ESET product will automatically use your computer's Windows


network setting to determine if you are using a public or a home or office
network to determine the appropriate firewall protection levels.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 29 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
SELF-CHECK 2.3-1

TRUE OR FALSE: Write the word TRUE in the space provider if the
statements are correct and FALSE if it is not.

______1. Client Device Settings is a way of configuring your client device by


which you cannot specify client settings at a collection level.
______2. On Windows 10 OS, to set up the Time and Date go to the right
bottom of your taskbar.
______3. Setting up your Computer Name is important. This will serve as
the Identity of your computer.
______4. Gateway is the IP address of your router or access point.
______5. Assigning an IP Address must be unique.
______6. The default subnet mask is, 255.255.255.0
______7. In setting up Time, you cannot set time automatically.
______8. In setting up the Time Zone, you could use "Philippines" for the
setting.
______9. Client setting on different OS are just the same.
______10. In installing network drivers, its compatibility on PC must be
consider.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 30 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
ANSWER KEY to 2.3-1

TRUE OR FALSE
1. False
2. True
3. True
4. True
5. True
6. True
7. False
8. False
9. False
10. True

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 31 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
INFORMATION SHEET 2.3-2

LAN Configuration

Learning Objectives:
After reading this Information Sheet, you should be able to:
1. To identify What is Local Area Network
2. Configure Local Area Network

Introduction
A Local Area Network (LAN) is a group of computers and associated
devices that share a common communications line or wireless link to
a server. Typically, a LAN encompasses computers and peripherals
connected to a server within a distinct geographic area such as an
office or a commercial establishment. Computers and other mobile
devices use a LAN connection to share resources such as a printer or
network storage.

Configuring Local Area Network

Equipment and Peripherals Needed for Configuring LAN

Equipment/Pepripherals Name Image


and Description
A personal computer (PC) is a
computer small and low cost, which
is intended for personal use (or for
use by a small group of
individuals). The term "personal
computer" is used to describe
desktop computers (desktops). It is
often shortened to the acronym PC
or microcomputer, whose meaning
in English is "personal computer".
It is a very common type of
machines.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 32 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Ethernet Cable often referred to as
a wired connection to the Internet,
an Ethernet cable can be any of
several common network cables
used to access the web.

Local area networks, referred to as


LANs, need Ethernet cables to
connect to personal computers and
routers. Ethernet cables support
either Category 5 (CAT5) or
Category 6 (CAT6) industry
standards, sometimes both.
Different types of network cables,
such as coaxial cable, optical fiber
cable, and twisted pair cables, are
used depending on the network's
physical layer, topology, and size.
The devices can be separated by a
few meters (e.g. via Ethernet) or
nearly unlimited distances (e.g. via
the interconnections of the
Internet).
Router is a device that analyzes the
contents of data packets
transmitted within a network or to
another network. Routers
determine whether the source and
destination are on the same
network or whether data must be
transferred from one network type
to another, which requires
encapsulating the data packet with
routing protocol header information
for the new network type.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 33 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Switch/Hub is short for port-
switching hub, a special type of hub
that forwards packets to the
appropriate port based on the
packet's address

Modem is a hardware device that


allows a computer to send and
receive data over a telephone line or
a cable or satellite connection.

When Equipment’s and Peripherals are all ready, we will now proceed
on Installing and Configuring Local Area Network. Below are steps in
configuring Local Area Network.

1. Prepare your Workplace


It must be clean and dry. Work on a spacious table. Do not forget to
apply the OHS policies and procedures.
2. Determine the number of computers you want to connect.
The number of computers you're connecting will determine the type of
network hardware you'll need.
• If you are connecting four or less computers, you'll just need
a single router or one switch if you don't need internet.
• If you're connecting more than four computers, you'll want
a router and a switch, or just a switch if you don't need
internet.
3. Determine your network layout.
If you’ re installing a permanent LAN solution, you'll want to keep
cable length in mind. CAT5 Ethernet cables should not run longer
than 250 feet. If you need to cover larger distances, you'll need
switches at regular intervals, or you'll need to use CAT6 cables.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 34 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
a. You'll need one Ethernet cable for each computer you want to
connect to the LAN, as well as an Ethernet cable to connect the
router to the switch (if applicable).
4. Plug one end of an Ethernet cable into your computer.
Make sure you're using an Ethernet cable (RJ45), not a telephone
cable.
5. Plug the other end of the cable into an open LAN port.
This can be any open LAN port on either the router or the switch,
depending on your LAN setup.
6. Reset the Router. In resetting your Router just click the small button
on the back of your router using a Pin or Ballpen and wait until all the
icons in front of the Router will Lights on this usually takes 10-15
seconds, depending on the brand of the router. See figure below.

7. Go to browser either “Google Chrome” or “Iexplorer”. And type in the


default IP Address. Depends on Manufacturer. For this module, we will
use 192.168.1.1. See figure below:

8. Router Login will appear. Type on default username and password.


Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 35 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
“admin” is most default username and password, still depends on
manuf acturer. You can find the default IP address, username and
password at the back part of you router. See figure below:

9. After encoding the default IP Address and entering the default


username and password, the Router User Interface will appear. We
will now ready for Router Setting Up

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 36 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
10. Click the Network Tab. And change your IP Address. Take note
on the Sequence of your IP Address. Apply and reboot.

11. Go to DHCP Server Tab, just uncheck the check button to


disable the DHCP services. Then click apply. If DHCP service is
disabled this setting will force your router not to assign an IP address
to any client device. But if you want to want to automatically let your
router to manage client devices, then you must enable it.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 37 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
SELF-CHECK 2.3-2

IDENTIFICATION: Identify what is being ask, write on the space


provided.
__________1. A small computer and low cost, which is intended for personal
use.
__________2. Is a device that allows a computer to send and receive data over
a telephone line or a cable or satellite connection.
__________3. Are networking hardware often referred to as wired connection
to the Internet.
__________4. A device that analyzes the contents of data packets transmitted
within a network or to another network.
__________5. Is a group of computers and associated devices that share a
common communications line or wireless link to a server.
__________6. Default IP address of a Router
__________7. Default Username and Password use for Logging in on your
Router Portal.
__________8. A tab on your Router Portal that can be used to change your IP
Address.
__________9. It is the first step before configuring your Router.
__________10. Indicator that your Router are already reseted.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 38 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
ANSWER KEY to 2.3-2

IDENTIFICATION:
1. Personal Computer
2. Modem
3. Ethernet Cable
4. Router
5. LAN
6. 192.168.0.1
7. Admin
8. Network Tab
9. Reset
10. Lights On (Icons in front)

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 39 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
JOB SHEET 2.3-1
Title: Configure Local Area Network
Performance Objective: Given a Network Materials (Router and
Ethernet Cable) together with a Personal Computer you should
Configure Local Area Network with allotted time of 40 minutes.

Supplies/Materials:
• Personal Computer
• Router and Ethernet Cable
• Personal Protective equipment (if necessary)
• Pins/Ballpen (Use f or resetting the Router)

Steps/Procedure:
1. Prepare your Workplace
2. Have the necessary Materials/Peripherals.
3. Connect Router and Personal Computer using your
Ethernet Cable
4. Reset your Router using Pins/Ballpen
5. Go to your Browser (Google Chrome or Iexplorer)
6. Type in the Default IP Address
7. Type in the default username and password
8. Set up Network Tab
9. Set up DHCP Tab

Assessment Method: Performance Criteria checklist

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 40 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Performance Criteria Checklist 2.3-2

Criteria Yes No

Did the trainee prepare the workplace?

Did the trainee have the necessary Materials/Peripherals?

Did the trainee Connected the Router and Personal Computer


using Ethernet cable?

Did the trainee reset the Router using Pins/Ballpen?

Did the trainee used the Browser (Google Chrome or


Iexplorer)?

Did the trainee type in the Default IP Address?

Did the trainee type in the default username and password?

Did the trainee set up the Network Tab?

Did the trainee set up the DHCP Tab?

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 41 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
INFORMATION SHEET 2.3-3

WAN Configuration

Learning Objective:
After reading this INFORMATION SHEET, you should be able to:

1. To identify What is Wide Area Network


2. To configure Wide Area Network

Introduction
A wide area network (WAN) is a geographically distributed private
telecommunications network that interconnects multiple local area networks
(LANs). In an enterprise, a WAN may consist of connections to a company's
headquarters, branch offices, colocation facilities, cloud services and other
facilities. Typically, a router or other multifunction device is used to connect
a LAN to a WAN. Enterprise WANs allow users to share access to
applications, services and other centrally located resources. This eliminates
the need to install the same application server, firewall or other resource in
multiple locations, for example.

Configure Wide Area Network


As we gather all the peripherals and equipment needed we will proceed on
Configuring Wide Area Network. Same process with Router but this time we
will use Modem or the Access Point. See steps listed below:

1. Gather your Modem, Ethernet Cable and Personal Computer. Connect


each peripheral using the Ethernet Cable. Directly connect Modem/Access
Point to your Personal Computer using the Ethernet Cable. This will just be
use for the setting up processes.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 42 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
2. Reset the Modem. In resetting your Modem just click the small button
at the back and wait until all the icons in front of the Modem will Lights
on. See figure below

3. Go to browser either “Google Chrome” or “I explorer”. And type in the


default IP Address of your Modem. Depends on Manufacturer. For this
module, we will use 192.168.1.2. And a Dialog box will pop up and
you will need to enter the default username and password. Use “admin”
for both username and password. See figure below

4. Repeat the step shown on Configuring your Router.


a. Go to Network Tab. Change your IP address. Click Save then it
will reboot.

b. Go to Network tab and select WAN.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 43 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
c. On WAN settings, choose the mode of your connection, ask you
ISP about it. But in our case “Dynamic IP” is the proper choice.
d. Click Apply.

e. Unlike on Router we need to set up the Wireless Tab on this


Modem/Access point. Click Wireless Tab. Select Basic then provide
the primary SSID of this wireless network. SSID is short for service set
identifier. In layman's terms, an SSID is the name for a Wi-Fi network
being broadcast by your Router/Access Point/Modem.

f. Click on Security tab, security mode would be WPA/WPA2 –


PSK mixed (Recommended) then enter your desired PSK key. It
must consist of alphanumeric characters. Click apply and
you’re done setting up you WAN and WI-FI connection.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 44 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 45 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
SELF-CHECK. 2.3-3

Rearrange the given steps on how to configure WAN. Put the correct
sequence of steps by using numbers 1-10 in the space provided, 1 is the
First Step and 10 is the Last Step.

______1. Go to Network Tab. Change your IP address. Click Save then it will
reboot.
______2. Directly connect Modem to your Personal Computer using the
Ethernet Cable. This will just be use for the setting up processes.
______3. And type in the default IP Address of your Modem.
______4. Click Wireless Tab. Click on WPA/WPA2 – PSK mixed then enter
your desired PSK Password.
______5. Prepare your Workplace, clean and Dry.
______6. Go to DHCP tab and click Disable Button.
______7. Reset the Modem. In resetting your Modem just click the small
button at the back and wait until all the icons in front of the Modem
will Lights on.
______8. Go to browser either “Google Chrome” or “I explorer”.
______9. Gather your Modem, Ethernet Cable and Personal Computer.
Connect each peripheral using the Ethernet Cable.
______10. And a Dialog box will pop up and you will need to enter the default
username and password. Use “admin” for both username and
password.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 46 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
ANSWER KEY to 2.3-3

REARRANGE:
1. 8
2. 3
3. 6
4. 10
5. 1
6. 9
7. 4
8. 5
9. 2
10. 7

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 47 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
JOB SHEET 2.3-3
Title: Configure Wide Area Network
Performance Objective: Given a Network Materials (Router and
Ethernet Cable) together with a Personal Computer you should
Configure Local Area Network with allotted time of 40 minutes.

Supplies/Materials:
• Personal Computer
• Access point and Ethernet Cable
• Personal Protective equipment (if necessary)
• Pins/Ballpen (Use for resetting the Access Point)

Steps/Procedure:
1. Prepare your Workplace
2. Have the necessary Materials/Peripherals
3. Connect Modem/Access point and Personal Computer
using your Ethernet Cable
4. Reset your Modem/Access point using Pins/Ballpen
5. Go to your Browser (Google Chrome or Iexplorer)
6. Type in the Default IP Address
7. Type in the default username and password
8. Set up Network Tab
9. Set up DHCP Tab
10. Set up Wireless Tab

Assessment Method: Performance Criteria checklist

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 48 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Performance Criteria Checklist 2.3-3

Criteria Yes No

1. Did the trainee prepare the Workplace?

2. Did the trainee have the necessary Materials/Peripherals?

3. Did the trainee connected the Modem/Access point and


Personal Computer using Ethernet Cable?

4. Did the trainee resets the Modem/Access point using


Pins/Ballpen?

5. Did the trainee used the Browser?

6. Did the trainee typed in the Default IP Address?

7. Did the trainee typed in the default username and


password?

8. Did the trainee set up the Network Tab?

9. Did the trainee set up the WAN Tab?

10. Did the trainee set up the Wireless Tab?

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 49 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
INFORMATION SHEET 2.3-4

Wireless Settings Configuration

Learning Objective:
After reading this INFORMATION SHEET, you should be able to:

1. To identify what is Wireless Network?


2. To enumerate steps in Configuring Wireless Settings

Introduction

Wireless networks are computer networks that are not connected by cables
of any kind. The use of a wireless network enables enterprises to avoid the
costly process of introducing cables into buildings or as a connection
between different equipment locations. The basis of wireless systems are
radio waves, an implementation that takes place at the physical level of
network structure.

Wireless networks use radio waves to connect devices such as laptops to the
Internet, the business network and applications. When laptops are
connected to Wi-Fi hot spots in public places, the connection is established
to that business’s wireless network.

There are four main types of wireless networks:

1. Wireless Local Area Network (LAN): Links two or more devices using
a wireless distribution method, providing a connection through access
points to the wider Internet.
2. Wireless Metropolitan Area Networks (MAN): Connects several
wireless LANs.
3. Wireless Wide Area Network (WAN): Covers large areas such as
neighboring towns and cities.
4. Wireless Personal Area Network (PAN): Interconnects devices in a
short span, generally within a person’s reach.

Configure wireless settings


After configuring the Router and Modem we will now proceed on
setting up the wireless network.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 50 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
1. First, we need to check whether you have a wireless adapter.
a. Select the Start button, type Device Manager in the search
box, and then select Device Manager.
b. Expand Network adapters.
c. Look for a network adapter that might have wireless in the name.

2. Setting up the modem and Internet connection


After you have all the equipment, you'll need to set up your modem
and Internet connection. If your modem wasn't set up for you by your
Internet service provider (ISP), follow the instructions that came with your
modem to connect it to your PC and the Internet. If you're using Digital
Subscriber Line (DSL), connect your modem to a phone jack. If you’ re using
cable, connect your modem to a cable jack.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 51 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
3. Positioning the wireless router
Put your wireless router somewhere where it will send and receive the
strongest signal with the least amount of interference. For better results,
follow these tips:
a. Place your wireless router in a central location. Place the router
as close to the center of your home as possible to increase the
strength of the wireless signal throughout your home.
b. Position the wireless router off the floor and away from walls
and metal objects, such as metal file cabinets. The fewer physical
obstructions between your PC and the router's signal, the more likely
that you'll be using the router's full signal strength.

Securing your wireless network


Security is always important; with a wireless network, it's even more
important because your network's signal could be broadcast outside your
home. If you don't help secure your network, people with PCs nearby could
access info stored on your network PCs and use your Internet connection.
To help make your network more secure:

Change the default user name and password.


This helps protect your router. Most router manufacturers have a default
user name and password on the router and a default network name (also
known as the SSID). Someone could use this info to access your router
without you knowing it. To help avoid that, change the default user name
and password for your router. See the documentation for your device for
instructions.

Set up a security key (password) for your network.


Wireless networks have a network security key to help protect them from
unauthorized access. We recommend using Wi-Fi Protected Access 2 (WPA2)
security if your router supports it. See the documentation for your router for
more detailed info, including what type of security is supported and how to
set it up.

Some routers support Wi-Fi Protected Setup (WPS). If your router supports
WPS and its connected to the network, follow these steps to set up a
network security key:

1. Select the Start button, look for Control Panel and click Network and
Internet. Then look for Network and Sharing Center.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 52 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
2. Select Set up a new connection or network.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 53 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
3. Select Set up a new network, and then choose Next.

The wizard will walk you through creating a network name and a security
key. If your router supports it, the wizard will default to Wi-Fi Protected
Access (WPA or WPA2) security. We recommend that you use WPA2,
because it offers better security than WPA or Wired Equivalent Privacy
(WEP) security. With WPA2 or WPA you can also use a passphrase, so you
don’t have to remember a cryptic sequence of letters and numbers. Write
down your security key and keep it in a safe place. You can also save
your security key on a USB flash drive by following the instructions in the
wizard. (Saving your security key to a USB flash drive is available in
Windows 8 and Windows 7, but not in Windows 10.)

Connect a PC to your wireless network

1. Select the Network or icon in the notification area.

2 3

1
2. In the list of networks, choose the network that you want to connect to,
and then select Connect.
3. Type the security key (often called the password).

4. Follow additional instructions if there are any

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 54 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
SELF-CHECK. 2.3-4

IDENTIFICATION: Identify what is being ask, write on the space


provided.

__________1. Are computers that are not connected by cables of any kind.
__________2. The basis of wireless systems.
__________3. Links two or more devices using wireless distribution method,
providing a connection through access point to the wider Internet.
__________4. Interconnects devices in a short span, generally within a
person’s reach.
__________5. Covers large areas such as neighboring towns and cities.
__________6. Connects several wireless LANs.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 55 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Answer Key to 2.3-4

REARRANGE:
1. Wireless networks
2. Radio waves
3. Wireless Local Area Network
4. Wireless Personal Area Network
5. Wireless Wide Area Network
6. Wireless Metropolitan Area Network

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 56 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
INFORMATION SHEET 2.3-5
Security/Firewall and Advanced Settings Configuration

Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
1. To identify What is Firewall with Advanced Security
2. To enumerate steps in Configuring Firewall with Advanced Security

Introduction

The Windows Firewall is a Microsoft Windows application that filters


information coming to your system from the Internet and blocking
potentially harmful programs. The software blocks most programs from
communicating through the firewall. Users simply add a program to the list
of allowed programs to allow it to communicate through the firewall. When
using a public network, Windows Firewall can also secure the system by
blocking all unsolicited attempts to connect to your computer.

A firewall is hardware or software that can help protect your PC from


unauthorized users or malicious software (malware). Running a firewall on
each PC on your network can help control the spread of malicious software
on your network, and help protect your PCs when you're accessing the
Internet. Windows Firewall is included with this version of Windows.

Setting Up Firewall with Advanced Security

Windows Firewall – Control Panel


Basic Windows firewall settings can be modified through Control Panel >
System and Security > Windows Firewall, as shown below. This interface
can also be accessed through PowerShell or Command Prompt by entering
‘firewall.cpl’.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 57 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
From here we can graphically view the status of the firewall for the domain,
private, and public profiles. These different profiles are used depending on
your current network connection. For example, if you’re joined to an Active
Directory domain, the rules applied in the domain profile will be used, while
if you’re connected to a public wireless network the settings in the public
profile will be used.

In this example, we can see the domain profile is listed as connected, as


we’re currently connected to the example.com domain.

To access the advanced settings, you can select the advanced settings link
from this menu on the left from within Windows Firewall.

Windows Firewall with Advanced Security


As mentioned above, we can open Windows Firewall with Advanced Security
by clicking the advanced settings button in Windows Firewall. We can also
run ‘wf.msc’ in either PowerShell or Command Prompt to open the advanced
security interface directly. The image below shows the advanced security
interface after opening.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 58 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
On this window we can see an overview of the domain, private, and public
profiles, which by default should all be enabled and blocking inbound traffic
and allowing outbound traffic.

From the menu on the left we can select either inbound or outbound rules.
As all outbound is allowed by default, we’ll focus on inbound rules here.
Connection security rules can also be setup to configure IPSec connections,
and monitoring can be used to log various firewall events.

Under inbound and outbound rules we can view the rules that exist and
that are currently enabled. These rules are available by default, rules with a
green tick icon on the left are enabled and will allow traffic in while rules
with no icon are disabled.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 59 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
A rule that is disabled can be enabled by simply right clicking it and
selecting enable. Likewise, we can right click an enabled rule and change it
to disabled. We can also view the properties of the rule by right clicking it
and selecting properties. This will allow you to see what the rule is actually
doing, including the ports that are being allowed through the firewall to
specific programs, we’ll see this in more detail next when we create our own
rule.

Create a Firewall Rule

Select Inbound Rules from the menu on the left and then select New Rule
from the actions pane on the right. This will open the new inbound rule
wizard. From here we can select if we want to create a rule for a specific
program, to a specific port, or based off of an existing rule. In this case we’ll
select custom as this gives us the most choice.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 60 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
On the next screen we can select the specific program or service that the
firewall should allow traffic in for. In this case we’ll just select all programs,
however note that this can be used to further lock down a rule, rather than
just allowing based on port/IP address we can also only allow traffic to a
specific program.

Next we can select the port and protocol that the rule should apply to. There
are many different protocols to select from in the drop down, in this example
we’re specifying that local TCP port 9000 should be allowed through the
firewall. We use local port here as port 9000 is available locally on this
server and listening for connections.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 61 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Now we can select an IP address or range of addresses that are allowed in
through our firewall rule. In this case I’m allowing the remote address range
192.168.0.0/24 in through the firewall, so only this IP range will be allowed
to connect to the server on TCP port 9000.

At this point we specify if we want to allow or deny the rule that we’re
creating, we’ll leave this on allow as we want to let 192.168.0.0/24 in on
TCP port 9000, however we could optionally explicitly block this instead. We
could also optionally only allow the connection if it’s secure, which relies on
IPSec being configured.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 62 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
We can select which firewall profiles our new rule applies to. By default, all
profiles are selected, however you can change this as per your requirements.

Finally, we can specify a name and optional description to identify our rule.
Once complete click finish, noting that as soon as you do this the rule will
be live as per how you have configured it.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 63 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Our new rule will now show at the top of the inbound rule list above all of
the default rules. We can identify it by its name and see briefly what it’s
doing, it’s allowing the remote address range 192.168.0.0/24 into the local
port 9000 with the protocol TCP on all profiles and is enabled.

By creating custom firewall rules such as this we can successfully configure


windows firewall with advanced security.
Summary: We can configure very basic firewall rules with Windows Firewall,
however Windows Firewall with Advanced Security is used to create much
more custom and granular rules as we have seen here.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 64 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
SELF-CHECK. 2.3-5

TRUE OR FALSE: Write the word TRUE in the space provider if the
statements are correct and FALSE if it is not.

________1. A firewall is hardware or software that can help protect your PC


from unauthorized users or malicious software (malware).
________2. Running a firewall on each PC on your network won't help control
the spread of malicious software on your network.
________3. Basic Windows firewall settings can be modified through Control
Panel > System and Security > Windows Firewall
________4. We can select an IP address or range of addresses that are
allowed in through our firewall rule.
________5. A rule that is disabled can be enabled by simply right clicking it
and selecting enable.
________6. When using a public network, Windows Firewall can also secure
the system by blocking all unsolicited attempts to connect to your computer.
________7. Windows firewall interface can also be accessed through
PowerShell or Command Prompt by entering ‘firewall.cpl’.

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 65 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Answer Key to 2.3-5

TRUE OR FALSE:
1. TRUE
2. FALSE
3. TRUE
4. TRUE
5. TRUE
6. TRUE
7. TRUE

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 66 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
References/Further Reading

INTERNET
1) http://www.tesda.gov.ph
a. CSS NCII TR
b. CSS NCII CBC
c. CSS SAG

https://www.rootusers.com/configure-windows-firewall-advanced-security/
http://www.informit.com/articles/article.aspx?p=131034
https://www.wikihow.com/Set-up-Ethernet
https://www.wikihow.com/Set-Up-a-Wireless-Router
http://www.simulationexams.com/tutorials/netplus/network-devices.htm
https://www.makeuseof.com/tag/7-simple-steps-diagnose-network-
problem/
https://www.brianmadden.com/feature/Types-of-Client-Devices-Terminal-
Services-for-Windows-Server-2003
https://www.webopedia.com/TERM/W/windows-firewall.html
https://www.techopedia.com/definition/26186/wireless-network
https://searchmobilecomputing.techtarget.com/definition/wireless
https://www.webopedia.com/TERM/S/SSID.html
https://searchenterprisewan.techtarget.com/definition/WAN
https://lifehacker.com/5831841/know-your-network-lesson-4-accessing-
your-home-computers-from-anywhere

Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 67 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00

You might also like