You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.
// INSTRUCTIONS:
Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.
You have successfully deployed a secure network architecture featuring perimeter defense (Firewall/Router), internal segmentation (DMZ), and secure wireless access protocols. This configuration minimizes the attack surface while allowing necessary services.
To conserve public IPv4 addresses, **RFC 1918** defines private IP ranges that are not routable on the global internet. You must use these for internal networks (LANs):
By default, a router's firewall blocks all unsolicited inbound traffic. To allow remote access to the PC, you configured a Port Forwarding Rule.
Security protocols have evolved to combat increasing computing power used to crack passwords. Here is a breakdown of the options:
Introduced in 2018, WPA3 mandates PMF (Protected Management Frames) and uses SAE (Simultaneous Authentication of Equals) instead of the 4-way handshake. This prevents offline dictionary attacks where a hacker captures a handshake and tries to guess the password later.
WPA2 uses AES (Advanced Encryption Standard), a robust block cipher with 128-bit (Personal) or 256-bit (Enterprise) keys. It creates a secure tunnel for data. While WPA3 is better, WPA2-AES is still considered secure for most home networks today, provided a strong password is used.
WEP used the RC4 stream cipher with a static key, leading to "IV Collisions" that allow attackers to crack the password in minutes. TKIP was a temporary fix for WEP but is also vulnerable. Modern routers often disable these by default.