You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.
// INSTRUCTIONS:
1. Deploy: Drag PC to DMZ, Console to LAN.
2. Devices: Click PC/Console to set IP/Mask/Gateway via Terminal.
3. Router: Click Router to configure WAN (/30), DMZ (/26), and NAT via Cisco IOS.
4. AP: Use dropdowns for Wireless config.
You have successfully deployed a secure network architecture featuring perimeter defense (Firewall/Router), internal segmentation (DMZ), and secure wireless access protocols. This configuration minimizes the attack surface while allowing necessary services.
To conserve public IPv4 addresses, **RFC 1918** defines private IP ranges that are not routable on the global internet. You must use these for internal networks (LANs):
The following commands were required to configure the Edge Router correctly:
interface GigabitEthernet0/0ip address 98.145.20.5 255.255.255.252interface GigabitEthernet0/1ip address 10.100.0.1 255.255.255.192ip nat inside source static tcp 10.100.0.55 3389 interface GigabitEthernet0/0 3389By default, a router's firewall blocks all unsolicited inbound traffic. To allow remote access to the PC, you configured a Port Forwarding Rule.
Introduced in 2018, WPA3 mandates PMF (Protected Management Frames) and uses SAE (Simultaneous Authentication of Equals) instead of the 4-way handshake. This prevents offline dictionary attacks where a hacker captures a handshake and tries to guess the password later.
WPA2 uses AES (Advanced Encryption Standard), a robust block cipher with 128-bit (Personal) or 256-bit (Enterprise) keys. It creates a secure tunnel for data. While WPA3 is better, WPA2-AES is still considered secure for most home networks today, provided a strong password is used.
WEP used the RC4 stream cipher with a static key, leading to "IV Collisions" that allow attackers to crack the password in minutes. TKIP was a temporary fix for WEP but is also vulnerable. Modern routers often disable these by default.