Lesson 10: Configuring Network Settings MOAC 70-687: Configuring Windows 8.1

Preview:

Citation preview

Lesson 10: Configuring Network Settings

MOAC 70-687: Configuring Windows 8.1

Overview• Exam Objective 3.1: Configure IP settings

o Configure name resolutiono Connect to a networko Configure network locations

Connecting to Wireless Networks

Lesson 10: Configuring Network Settings

© 2013 John Wiley & Sons, Inc. 4

Connecting to Wireless Networks

• The process for connecting a Windows 8 computer to a wireless network is very simple when

• the network is broadcasting its service set identifier (SSID) .

• The SSID is the name for the wireless network.

• Any wireless network that is broadcasting its name appears in the list of available networks in Windows 8.1.

Connecting to Wireless Networks

Selecting the wireless network icon

© 2013 John Wiley & Sons, Inc. 5

© 2013 John Wiley & Sons, Inc. 6

Connecting to Wireless Networks

• If you need to connect to a wireless network that is not broadcasting its SSID, the process is a little more involved.

• Because the network is not broadcasting, it does not appear in the list of available networks. This means you have to enter information such as the network’s SSID (network name), security type, encryption type and security key to connect to it.

• Because the network does not appear on your network list, you must connect to it by using the Network and Sharing Center.

• The Network and Sharing Center provides a central location for network configuration controls (changing settings, managing wireless networks, network sharing settings).

Connecting to Wireless Networks

The Manually connect to a wireless network page

© 2013 John Wiley & Sons, Inc. 7

© 2013 John Wiley & Sons, Inc. 8

Understanding Wireless Security

• Wireless networks are subject to many of the same security threats as cabled networks, but the medium they use makes it easier for attackers to penetrate them.

• Some of the specific types of attacks to which an unsecured wireless network is subject are:o Eavesdroppingo Masquerading o Attacks against wireless clients o Denial of service o Data tampering

© 2013 John Wiley & Sons, Inc. 9

Evaluating Wireless Networking Hardware• The 802.11 standards published by the

IEEE dictate the frequencies, transmission speeds, and ranges of wireless networking products.

• The two main security protocols used in wireless LAN devices:o Wired Equivalent Privacy (WEP)o WiFi Protected Access (WPA and WPA2)

© 2013 John Wiley & Sons, Inc. 10

IEEE Wireless Networking Standards

© 2013 John Wiley & Sons, Inc. 11

Using Wired Equivalent Privacy

• WEP is a wireless security protocol that helps protect transmitted information by using a security setting, called a shared secret or a shared key, to encrypt network traffic before sending it.

• To use WEP, administrators must configure all of the devices on the wireless network with the same shared secret key.

• The cryptography used by WEP is relatively weak, and programs that can analyze captured traffic and derive the key from it are readily available.

© 2013 John Wiley & Sons, Inc. 12

Selecting an Authentication Method• The initial WEP standards provided for two

types of computer authentication: o Open system enables any client to connect

without providing a passwordo Shared secret requires wireless clients to

authenticate by using a secret key

© 2013 John Wiley & Sons, Inc. 13

Using Wi-Fi Protected Access

• To address the weaknesses of WEP, the Wi-Fi Alliance developed Wi-Fi Protected Access (WPA).

• There are two encryption options for WPA: o Temporal Key Integrity Protocol (TKIP) o Advanced Encryption System (AES)

• In its current form, WPA has two operational modes: o WPA2-Personal o WPA2-Enterprise

© 2013 John Wiley & Sons, Inc. 14

Service Set Identifier (SSID)

• The SSID is the name for the wireless network.

• Any wireless network that is broadcasting its name appears in the list of available networks in Windows 8.1.

• If you hold your mouse over the network name without clicking, you can see the security type (e.g., WEP, WPA2) used and the wireless protocol required (e.g., 802.11g, 802.11n).

Managing Preferred Wireless Networks

Lesson 10: Configuring Network Settings

© 2013 John Wiley & Sons, Inc. 16

Prioritizing Networks in Windows 8.1

• Windows 8.1 determines the connection priority automatically based on the type of network you are connected to.

• The highest priority network is always an Ethernet (wired) connection with Wi-Fi and then mobile broadband networks preferred when Ethernet is not available.

Select a Preferred Network

Connecting to a preferred network

© 2013 John Wiley & Sons, Inc. 17

© 2013 John Wiley & Sons, Inc. 18

Removing Wireless Networks / Profiles

• A wireless profile is a file in Windows 8.1 that stores information about a wireless network that you use on a repeated basis.

• To view all wireless profiles currently stored on your computer, from a command prompt, type the following and then press Enter:netsh wlan show profiles

© 2013 John Wiley & Sons, Inc. 19

Removing Wireless Networks / Profiles

• To delete a wireless profile that is no longer within range, from a command prompt, type the following and press Enter. Be sure to replace <profile name> with the actual name of the profile you want to remove:netsh wlan delete profile name=”<profile name>”

Configuring Network Adapters

Lesson 10: Configuring Network Settings

© 2013 John Wiley & Sons, Inc. 21

Network Adapters• A network adapter (network interface card

(NIC), Ethernet adapter, wireless adapter, Wi-Fi card) is the hardware component used to connect your Windows 8.1 computer to a wired or wireless network.

• The easiest way to access the configuration settings for a network adapter is to use the Network and Sharing Center.

• To configure the network adapter click the Change adapter settings link.

Configuring Network Adapters

The Network Connections dialog box

© 2013 John Wiley & Sons, Inc. 22

© 2013 John Wiley & Sons, Inc. 23

Configuring Network Adapters

The advanced configuration options for a wireless network adapter

© 2013 John Wiley & Sons, Inc. 24

Configuring Network Adapters

Advanced configuration options for a wired network adapter

© 2013 John Wiley & Sons, Inc. 25

Network Adapter Modes

• When working in ad hoc mode, you are configuring the wireless network adapter to connect to other computers who are also using wireless network adapters.

• You can also configure the wireless network adapter to work in infrastructure mode. In infrastructure mode, the wireless network adapter is configured to connect to other computers through a wireless access point.

Configuring Location-Aware Printing

Lesson 10: Configuring Network Settings

© 2013 John Wiley & Sons, Inc. 27

Location-Aware Printing

• Windows 8.1 has a featured called location-aware printing that can make the process of moving between networks and connecting to printers much simpler.

• Location-aware printing, works by telling Windows 8.1 Pro to update and select the default printer based on the currently connected network.

• Location-aware printing depends upon the Network Location Awareness service and the Network List Service to determine network information.

© 2013 John Wiley & Sons, Inc. 28

Configuring Location-Aware Printing

• To configure location-aware printing, you:o Must be running a laptop computer with

Windows 8.1 Pro or later.o Need to connect to printers on at least two

different networks.

Configure Location-Aware Printing

The Manage default printers dialog box

© 2013 John Wiley & Sons, Inc. 29

Lesson Summary• The IEEE dictates the frequencies, transmission speeds, and

ranges of wireless network products. • The Wired Equivalent Privacy (WEP) and WiFi Protected

Access (WPA/WPA2) are the two main security protocols used in wireless LAN devices.

• WiFi Protected Access was designed to address the weaknesses of WEP and uses two encryption options: Temporal Key Integrity Protocol (TKIP) and Advanced Encryption System (AES).

• If a wireless network is broadcasting its SSID (network name) and it is within range of your Windows 8.1 computer, it appears in the list of available networks. You can simply click the network and enter the appropriate security key to connect.

© 2013 John Wiley & Sons, Inc. 31

Lesson Summary• A wireless profile is a file that contains the wireless SSID,

security type and encryption type and security keys. • If a wireless network is not broadcasting its SSID, you have

to enter information such as the network’s SSID, security type, encrypting type and security key manually by going through the Network and Sharing Center.

• Windows 8.1 automates the process of managing the preferred network when it is within range. Unlike Windows 7 which allowed you to set the priority of one network over another, Windows 8/8.1 determines the priority based on the type of network you are connected to and the order in which you connect to the network.

© 2013 John Wiley & Sons, Inc. 32

Lesson Summary• If you do not want Windows 8.1 to automatically connect to

a network, you can use the Forget this network option if you are currently in range or the netsh wlan delete profile name=”<profile name>” command if the network is no longer within range of your computer.

• Adhoc mode is used when you configure a wireless network adapter to bypass a WAP and connect directly to other wireless computers. Infrastructure mode is used when you want the wireless adapter to connect to a WAP.

• Location-aware printing, available on Windows 8.1 computers that have batteries only (e.g., laptops) allows you to configure a default printer for each network you connect to.

© 2013 John Wiley & Sons, Inc. 33

Lesson Summary• The Network Location Awareness services

and the Network List Service are required in order for location-aware print to work. If either of these two services is not functioning, Windows 8.1 is not able to detect changes in networks and cannot adjust the default printer accordingly.

Copyright 2013 John Wiley & Sons, Inc.. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.