Assignment title: Information


Course Code: ICT50415 Course Name: Diploma of Information Technology Networking Unit Code: ICTNWK531 Unit Name: Configure an Internet Gateway. Assessment: Tasks 1,2 & 3. Student Name: Juan Marquez, Tianxing Gong, Sujit Baral Student ID: 3214 Trainer Name: Ashutosh Patel 1Table of Contents Task 1 3 1.1 Introduction 3 1.2 Types of connection 3 1.3 The proposed network diagram 4 1.4 Selected Plans 4 1.5 Installation 5 Task 2 6 2. Security features 6 2.1 Firewall Intrusion Detection Settings 6 2.1.1 Introduction 6 2.1.2 Predefined security levels 7 2.2 Parental Control 7 2.2.1 Introduction 8 2.2.2 Access Denied page 8 2.2.3 Address-based filtering 8 2.2.4 Content-based filtering 8 2.2.5 Combining the two filters 9 2.2.6 Activating content-based filtering 9 Task 3 11 3.1 Identify and select installation and configuration options. 11 3.2 Install and configure gateway products and equipment as required by technical guidelines. 13 3.3 Plan and execute tests with reference to client requirements and network impact. 14 3.4 Analyse report error and make changes as required. 14 Task 4 14 4.1 Assign node to specific gateway as required by network architecture and client requirements. 14 4.2 Determine the connection type and configure with reference to network architecture and client requirements. 15 4.3 Ensure node software and/or hardware is configured as required according to vendor specifications and client requirements. 16 References 16 Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 2Task 1 1.1 Introduction The aim of this report is planning to set up a internet service for Keepkool. Firstly, an Internet Service Provider(ISP) will be selected for the client, Keepkool. Secondly, the security features will be showed and a user guideline will be provided. Thirdly, a router will be configured and tested. Finally, the wireless point will be configured with the router. 1.2 Types of connection Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) technology, a data communications technology that enables faster data transmission over copper telephone lines rather than a conventional voiceband modem can provide. ADSL differs from the less common symmetric digital subscriber line (SDSL). In ADSL, Bandwidth and bit rate are said to be asymmetric, meaning greater toward the customer premises (downstream) than the reverse (upstream). Providers usually market ADSL as a service for consumers for Internet access for primarily downloading content from the Internet, but not serving content accessed by others. Cable/ Hybrid fiber-coaxial (HFC) is a telecommunications industry term for a broadband network that combines optical fiber and coaxial cable. It has been commonly employed globally by cable television operators since the early 1990s. In a hybrid fiber-coaxial cable system, the television channels are sent from the cable system's distribution facility, the headend, to local communities through optical fiber trunk lines. At the local community, a box called an optical node translates the signal from a light beam to electrical signal, and sends it over coaxial cable lines for distribution to subscriber residences. The fiber optic trunk lines provide adequate bandwidth to allow future expansion and new bandwidth-intensive services. The National Broadband Network (NBN) is an Australian national wholesale-only, open-access data network. It is based on the premise that access to fixed line, wireless and satellite broadband connections are sold to retail service providers (RSPs), who then sell internet access and other services to consumers. Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 31.3 The proposed network diagram As the diagram shown, a router will be set up to connect to the Internet. Then, a switch will be connected to the router, and the whole LAN will be linked to the switch as well including the server of Keepkool.com. People can access Keepkool.com via the Internet, going through the router, and request information from the server via the switch. 1.4 Selected Plans Plan A ISP: Belong Data: Unlimited Contract period: 12 months Speed of traffic: 100/40 Mbps Connection type: ADSL/ NBN Price: $65 per month Comment: The most significant advantage is the cheapest price with relatively high speed of traffic. The contract period is short, which means the client can change the ISP in a year if they are satisfied to the service. Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 4Plan B ISP: Telstra Data: 1000 GB/Month Contract period: 24 months Speed of traffic: depends on location Connection type: ADSL/ CABLE/ NBN Price: $99 per month Comment: Telstra's offer is more expensive and limited, but it is the biggest ISP in Australia. It provides stable and reliable network. It has the best customer service for 24-7. The widest range of service area covers most place in Australia. To balance pros and cons, we would suggest that the client may choose Plan A with the ISP Belong, if they cover the address of the client. Because the data they offer is unlimited and price is cheaper. At the moment we have not known about how much data the client will use in a month. If we choose Telstra, the speed will be very slow if the usage exceed the limit, or additional costs will occur. 1.5 Installation As required, the configuration of the Internet service should only have a little effect on the existing LAN. To minimise the effect, Dynamic Host Configuration Protocol (DHCP) will be employed. It is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. In addition, we will ask the best time to setting up the Internet service. The proper time would be at night, when the employees go home. Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 5Task 2 2. Security features 2.1 Firewall Intrusion Detection Settings 2.1.1 Introduction The Technicolor Gateway comes with an integrated firewall that helps you protect your network from attacks from the Internet. This firewall has a number of predefined levels to allow you to adjust the firewall to your needs. The Firewall is disabled by default. This means that ​all traffic passing through the Technicolor Gateway (from and to the Internet) is allowed. Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 6​2.1.2 Predefined security levels The Technicolor Gateway has a number of predefined security levels. The following levels are available: < ​BlockAll ​: All traffic from and to the Internet is blocked. Game and Application Sharing is not allowed by the firewall. < ​Standard ​: All outgoing connections are allowed. All incoming connections are blocked, except for inbound connections assigned to a local host via Game and Application Sharing. < ​Disabled ​: All in- and outgoing traffic is allowed to pass through your Technicolor Gateway, including Game and Application Sharing. This is the default firewall level. 2.2 Parental Control Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 72.2.1 Introduction The Technicolor Gateway allows you to deny access to specific web sites. 2.2.2 Access Denied page When a user tries to access a page that is being blocked, the following page is displayed: 2.2.3 Address-based filtering With address-based filtering (or URL-filtering) you can ​block websites based on their address (for example www.porn.com). 2.2.4 Content-based filtering As you know, the Internet consists of a large number of web sites, and that number still increases every day. This makes it almost impossible to keep the list of addresses up-to-date. To solve this problem Technicolor Gateway introduced content-based filtering. With content-based filtering you can ​block web sites based on their content category (for example pornography) instead of their URL. This way, you only need to select the appropriate categories and the content category server takes care of the rest. This content category server is updated at regular intervals. Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 82.2.5 Combining the two filters Address-based filtering has priority over content-based filtering. This means that when you are blocking a specific category, you can still access a specific address provided you create a rule to allow access to that URL. For example, if you are blocking content from the ​Finance / Investment ​category, you can create a rule to make an exception for netbanking.mybank.com. 2.2.6 Activating content-based filtering Before you can use content-based filtering you must first activate it by purchasing a license key at your service provider or by activating the 30-day trial. Proceed as follows: ● Browse to the ​Technicolor Gateway GUI. ● On the ​Toolbox ​menu, click ​Parental Control ​. ● In the ​Pick a task ​list, click ​Activate Web Filtering ​License. ● The ​Web Filtering Activation ​page appears. Under ​License Type ​, select: a. ​30-days evaluation ​if you first want evaluate this feature. b. ​Standard ​if you have already purchased a license key. The License key box appears as soon as you select this option. Type the license key that you received from your service provider in this box. ● 5. ​Click ​Apply ​. Option 1: content-based filter (combined with the address-based filter) If you want to use the content-based filtering: 1. ​Browse to the ​Technicolor Gateway GUI. 2. ​On the ​Toolbox ​menu, click ​Parental Control ​. 3. ​On the ​Navigation bar, click ​Configure ​. 4. ​Make sure that the ​Use Content-Based Filter ​check box is selected. 5. ​Configure the content-based filter. 6. ​If you want to make exceptions for specific web sites, add the necessary rules in the address-based filter. Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 9Option 2: address-based filter only Take this option if content filtering is not available on your Technicolor Gateway or you don't want to use it. To configure address-based filtering: ● Browse to the ​Technicolor Gateway GUI. ● On the ​Toolbox ​menu, click ​Parental Control ​. ● On the ​Navigation bar, click ​Configure ​. ● Make sure that the ​Use Address-Based Filter ​check box is selected. ● In the ​Action for Unknown Sites ​, select: ● Allow ​as the default rule if you want to allow access to ​all web sites and manually specify which web sites may not be ● accessed. ● Block ​as the default rule if you want to deny access to ​all web sites and manually specify a number of web sites that ● may be accessed. ● Click ​Apply ​. ● If you want to make exceptions for specific web sites, add the necessary rules in the address-based filter. Briefly , about the security plan it denies the specific websites , address -based filtering can be done where the web sites can be blocked. (eg. ​www.pornhub.com ​) .For eg we can block porn adrress from home to make away from children. The posibility hazard is unable to use Dynamic DNS. Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 10Task 3 3.1 Identify and select installation and configuration options. Connection Information: In this field, the account information (customer information) is displayed to verify that this fields match with the client. This information is necessary to establish the connection with the internet. TCP/IPv4 Settings : ​The DNS and WAN address are provided by the ISP. Local Network: Network address and VoIp are preconfigured by the ISP. The IP of the gateway is 10.0.0.138 and the DCHP pool start from 10.0.0.1 to 10.0.0.137. Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 11Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 123.2 Install and configure gateway products and equipment as required by technical guidelines. Belong will provide a brand new pre-configured router with its respective installation guide. However, according to the customer's requirements, the router can be accessed by connecting a PC and typing in any internet browser the following URL: https://10.0.0.138/ to change the default parameters. In order to perform the physical installation of the router, it is necessary to connect the device to the wall socket which is normally used to connect the phone, sometimes is necessary to use a splitter to reduce any noise. The correct way to connect this is by connecting one end of the grey phone cable into the filter socket labelled ADSL, and plug the other end into the grey socket labelled DSL on the back of the modem. Any VoIP system should be connected by simply plugging the telephone cable from the base station/handset into the filter port labelled 'Local Phone'. Change default password Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 133.3 Plan and execute tests with reference to client requirements and network impact. In order to minimise any network impact and prevent from disruptions the following tests should be performed as following. ● Connectivity test ​: It can be performed by connecting a PC in any of the ethernet ports to verify the basic internet connection. Additionally in this test, the DHCP protocol can be verified by checking the ip address assigned to the PC. the ip assigned must be in the range from 10.0.0.1 to 10.0.0.137. ● Firewall Content Filtering: The forbidden sites or services can be verified by accessing any web site and checking which one of those have been dropped or by verifying the message in the web browser. ● Internal Services Allowed ​: Services such as ftp and smtp can be tested by configuring one PC as a server and the other one as a client, and verify whether the client computer has access to these services. ● Penetration Test ​: This test can be performed by using any free tool to scan ports such as nmap. In this test, the logs of the router can be verified to check whether the firewall is denying and reporting the attack. Once the test is completed, the IT staff will perform the installation activity. All changes or implementation tasks must be carried on out of business hours. 3.4 Analyse report error and make changes as required. All the tests and logs from the router will be analysed to determine any fault or undesired outputs. After that, having identified any security breach, if is the case, the staff from the company and the IT members will agree about the new activities to correct any security issue. Task 4 4.1 Assign node to specific gateway as required by network architecture and client requirements. The default gateway for all the network devices will be the modem provided by Belong. The IP address for the default gateway is 10.0.0.138. As the default gateway of the network will be the provided by the ISP, all the traffic will be routed by using the default gateway (inbound - outbound). However, the public addresses and the DNS will be assigned automatically by the ISP (outbound - inbound). Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 144.2 Determine the connection type and configure with reference to network architecture and client requirements. DSL Connection Link Information Uptime: 14 days, 22:41:07 DSL Type: ITU-T G.992.5 Bandwidth (Up/Down) [kbps/kbps]: 391 / 7,926 Data Transferred (Sent/Received) [GB/GB]: 1.07 / 18.99 Wireless Access Point - Technicolor Configuration WLAN Enable: Yes Interface Enabled: Yes Power Reduction Enabled: No Physical Address: 30:91:8f:18:3c:bb Network Name (SSID): Technicolor Interface Type: 802.11b/g/n Actual Speed [Mbps]: 65 Band: 2.4GHz WPS Enabled: Yes Allow New Devices: New stations are allowed (automatically) Security Mode: WPA-PSK Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 15Wireless Configuration 4.3 Ensure node software and/or hardware is configured as required according to vendor specifications and client requirements. During all the implementation activities, checklists will support all the aspects of the installation and works performed. These documents must be signed and previously agreed between the parts. References ● https://www.belong.com.au/ ● https://www.telstra.com.au/ Name: Juan Marquez Student Id:3214 Diploma of Information Technology Networking ICTNWK531 16