download: CONFERENCE 2015 WiFi IN THE LIBRARY presentation

advertisement
WIRELESS
IN YOUR LIBRARY
The Anatomy of a Library Communications Network
The Agenda
Components of a Network Blocking Websites
Logs, Stats, Monitoring
Typical Network Layout
WiFi vs Wireless (Cell)
Traffic Control
Setting up your Wifi
Summary
Security
Guest Network
Q&A
ANATOMY OF A WIRELESS NETWORK
Common Equipment
•
Cable or DSL Modem
Common Equipment
•
Cable or DSL Modem
•
Router (aka Firewall)
Common Equipment
•
•
•
Modem (Cable/DSL)
Router (aka Firewall)
Switch
Common Equipment
•
Wireless Router/ Access Point
Common Equipment
•
Network Cables
A Typical Network
INTERNET
aka ‘The Cloud’
Does Wireless = Wifi?
WiFi
•
Your device is connected to a wireless access point or
router in your library, a building, the library parking lot
Cellular Wireless
•
Your device, typically a cell phone, connects to the cell
towers.
Both methods allow access to the internet.
2 main purposes
Wireless Internet
•
Access the INTERNET wirelessly
Wireless Intranet
•
Access your local network devices wirelessly
•
•
Printers
Shared folders
Why offer wireless?
•
•
•
•
Community Access to Internet Media
Accommodate Mobile Users
Remain Current
Other reasons?
Cellular Wireless vs Wifi
Internet
Cell Tower
Library WiFi
Connecting to
‘The Wireless’
To switch
Wireless Router Setup
•
Step 1
•
•
Step 2
•
•
Connect a computer to the network with a cable.
Connect the wireless router to the same network and
power it on
Step 3
•
Navigate to the router’s administration screen using a
browser
Wireless Router Setup
•
•
Wireless routers are configured using a browser like
Internet Explorer
You access the configuration by navigating to the
router’s IP address
Screenshots from a Netgear WNDR3700 for
demonstration purposes
Wireless Router Setup
http://192.168.1.1
enter the router’s IP
address
Wireless Router Setup
Common Features
•
•
•
•
Security using WPA2 (not WEP)
Guest Networks
Content Filtering
Maintenance Functions
Security
•
•
What is wireless security?
Why do you think security is important?
Security
WPA2 Passphrase
This is the password you
give your patrons.
Guest Networks
•
•
•
•
•
Allows patrons to connect to the wireless and only
access the internet. Not local files, folders or
devices such as printers.
Can use a password or not
Can enable or disable it anytime.
Users will not have access to the router
administration setup or the network
Ideal for patrons.
Guest Network
with Isolation
•
•
Some routers not only allow guest networks but also
Wireless Isolation
Prevents any wireless client from accessing other
clients.
Configuring
the Guest Network
Blocking Websites
•
•
•
•
limit access to certain sites on the Internet
Blocking access to certain domains (for example,
www.badstuff.com/XXX)
Blocking sites that contain certain words (like
profanity or explicit sexual material).
When users try to access a blocked site, they will
get a message…
Website Blocked!
Blocking Services
•
•
•
allows you to block Internet access by specific users
on your local network based on their IP address
prevent the use of certain Internet services such as
surfing the Web (http) by everyone or just a few
people on your network.
configure service blocking to be on never, on
according to a schedule, or on always.
Common Services
•
•
•
HTTP – General web surfing
SMTP – Web Email
TCP – Internet Games such as the popular World of
Warcraft use TCP and UDP services
Blocking the infamous
World of Warcraft
•
•
World of Warcraft uses service TCP and port
number 3724
Blocking this service as well as the ports will prevent
people on your wireless network from accessing it.
Block Access
based on a Schedule
•
you can set up a schedule for when blocking occurs
or when access is not restricted.
Email Notifications
•
•
Alerts can be sent when someone tries to visit a
blocked site
Logs show websites that have been visited
Viewing the Logs
•
•
•
A log is a detailed record of the websites that users
have attempted to access
If you have e-mail notification on, you can receive
these logs in an e-mail message.
If you do not have e-mail notification set up, you can
view the logs on the router itself.
See Who’s Connected
•
Some routers allow you to see who is currently
connected and keeps a history for statistical
purposes.
Traffic Control
•
record and restrict the volume of Internet traffic
•
•
•
No Limit - If this is selected specified restriction will not
be applied when traffic limit is reached.
Download only - If this is selected the specified
restriction will be applied to the incoming traffic only
Both Directions - If this is selected the specified
restriction will be applied to both incoming and
outgoing traffic only
Limit Connection Time
•
record and restrict the time usage of the Internet
connection
Summary
•
•
Most library networks are simple when you get right
down to it.
Made up of 3 main components:
•
•
•
Modem
Router(firewall)
Switches
Summary
•
Most networks only have 2 or 3 TYPES of devices
attached to them
•
•
•
Computers
Printers
Wireless Access Points/Routers
Summary
•
Even huge networks with dozens of switches
supporting hundreds of computers, printers and wifi
access points are really the same as the smaller
networks…they just have more of the same!
Don’t sweat the IT stuff!
•
•
If you ARE the IT person, don’t sweat it. Just grab
the manual for whatever the device is and go for it!
Once you start reading, you’ll soon see how simple
all this really is.
If you can catalogue a book you can configure a
wireless router in your sleep!
?
Download