sábado, 22 de octubre de 2011

CÁPITULO 16

LABORATORIO 16

16.4.3




16.5.3 Lab: Remote Technician: Fix a Security Problem

(Student Technician Sheet)

Company Name: Smith Lumber Supply

Contact: James Smith

Company Address: 1234 S. Main Street

Company Phone: 801-555.1212

Category Security Closure Code____________ Status Open___

Type ____________ Escalated________ Pending_______________

Item_____________ Pending Until Date________________

Business Impacting? X Yes Ο No

Summary Customer cannot use laptop wireless connection at work

Case ID#______________ Connection Type Wireless___

Priority___________________ Environment__________________

User Platform __Windows XP Pro

Generating a New Ticket

Problem Description: Customer’s wireless connection does not work in any location at the work place. The customer can use wireless connection at home and other places.

Problem Solution:

Fijarse si el portátil hace arte de la misma mascara subred del lugar de trabajo, además de configurar algún tipo de proxy verificar puertos de red. Reiniciar para guardar configuración.


(Student Customer Sheet)

Use the contact information and problem description below to report the following information to

your lab partner who will be acting as a level-two technician. Your lab partner will guide you

through the process of troubleshooting and fixing your wireless connection remotely. You must

perform the tasks your lab partner recommends.

Contact Information

Company Name: Smith Lumber Supply

Contact: James Smith

Company Address: 1234 S. Main Street

Company Phone:801-555-1212

Category: Security

Problem Description

You are unable to use your laptop’s wireless connection while at work. The wireless connection

works fine at home and the coffee shop downstairs, but for some reason, it will not connect to the

wireless anywhere in the office. Since you are unable to access the wireless connection, you

have been using the Ethernet cable connection instead. The cable connection is working fine.

(NOTE: Once you have given the problem description, use the Additional Information to answer

any follow up questions your lab partner may ask.)

Additional Information

Windows XP Pro

XP Wireless Client

Wireless client can see the wireless network

My wireless connection worked yesterday at work

I can connect using an Ethernet cable

My wireless account is in good standing

Wireless connection works for other employees

I have not made any changes to my wireless security settings

A new wireless router was installed on the network yesterday

Problem Solution:

Observar la ubicación del router, para saber si haya interferencia lo que hace que no llegue buena señal y no haya conexión, revisar la dirección IP, mascara subred, y puerta de enlace. Habilitar los puertos por donde llegarán los datos.

16.5.3 Optional Lab: Troubleshooting Access Security with Windows 7


Recommended Equipment

The following equipment is required for this exercise:

One computer running Windows 7 on an NTFS partition

Scenario

Company XYZ has hired Devon to manage the training department. Shawna was also hired as a temporary employee to replace Brooks, who is no longer working for the company. You must solve access security problems for the training department. You might need to access the computers as each user and the administrator. Make sure you document and solve the problems, and then document the solutions.

There are several possible errors. Solve one problem at a time until there are no security breaches and access problems. Use the following tables when solving problems. The user account information is listed in Table 1. Use only the groups shown in Table 2, they are set up with the proper permissions. The instructor will provide the administrator’s account information.

Table 1: Accounts

User Name

Password

Group for User

Brooks

Cisco2001

Guests

Shawna

Cisco2010

Guests

Devon

Cisco2100

Academy Student

Administrator user name:

Leidy Avila

Administrator Password:

Sena2011

Administrators

Table 2: Groups

Groups

Group Permissions

Academy Student

Read & Execute, List Folder Contents, Read, Write

Read & Execute, List Folder Contents, Read

Administrators

Full Control

Solución:

Ya que se va una persona de la empresa solo quedaría 3 cuentas que serían la de estudiante, invitado y administrador, me parece oportuno dejar tal cual los permisos establecidos para cada uno de los usuarios. Ya que se conoce cada contraseña, lo siguiente seria reemplazarlas como plan de mantenimiento en la red y seguridad, a la vez dejarlas ocultas.

0 comentarios:

Publicar un comentario