Skip to main content

Routerworld

As I poke around my home office, I find two wireless routers. Technically they should be a combo switch/router, or a L3 Switch, but they're here.

Well, one is the combo device, one is a flat out wireless router that would connect to an ISPs router to give us access to the internet.

So I hooked one up to my PC (My Laptop doesn't have Ethernet ports) so I could poke around again with my old-found (as opposed to new-found) IT knowledge.

Welcome to Routerworld.


We own the equipment even though we don't have AT&T's internet anymore.




It's not like Cisco's command line interface - This is for the consumer market, and that means you have to make things GUI-ish.




Hey, we may not use this anymore but that doesn't mean I want people to see the Key.

We weren't using WEP, but TKIP is only marginally better. There was some kind of odd disconnect if I recall correctly - Every device could use the higher security settings except my 2013 Macbook Air, so the compromise was made.

I should check what Authentication type our current setup is using.

Here is how an individual device would look; In this case, my Wii U.


I'm not sure what outbound port it would use, not 80.

The Wii U (and Switch) are P2P connected for playing Splatoon online.

Since the higher-ports are used for certain manufacturers (or just at random for connectivity), I *think* the Wii U had a port in the 4000s that one could tell their local firewall to leave open to have the game run smoother, but it normally boiled down to your internet speed, especially the upload speed.

Speaking of the Firewall;


Block ping is telling your firewall not to respond if someone pings it.

The alarming thing is, The Telnet box was checked!

 Of course, that's if I initiated the connection, but I hope that even in the year 2016 people weren't allowing Telnet connections.

Oddly, SSH isn't a standalone option.


Bridge mode would be two computers talking to each other on the local network.



If your home network is using 190 devices, wow.

Ethernet enabled - My PC and either my phone (Charging, attached to my PC), or the Wireless adapter (Because I don't have a wireless card in this particular machine).

I have more reason to believe it's probably seeing the wireless adapter because it can see nine active devices on the Wireless side - probably various DirectTV cable boxes, maybe our router in use now.

Here are some logs;


I leave you with some Digital Subscriber Line details. Nothing, because no internet service.

EMPLOYERS: This is me repurposing old technology.

Comments

Popular posts from this blog

Making KPI Dashboards with PowerBI

 While this is the free tier, I cannot share or collaborate with others, nor can I publish content to other people's workspaces, but they will not stop me from screenshooting and recording these self-taught adventures,so! I'm doing this because I idly searched "Mattel careers" and "Information Technology", and seeing a bulletpoint saying the following: Analytical and reporting skills such as creating dashboards and establishing KPIs such as experience with PowerBI, Cognos, Tableau, and Google Data Lake/AWS is preferred And thought "Well, I've used Tableau, and I've heard about PowerBI,  even if its in-demandness is questionable , so how similar is it? And can I write about it?"  First, PowerBI (PIB) does have a downloadable, local version, but apparently Windows-only. I could download the .exe but I couldn't run it / drag it to applications on my MacBook.  Not a problem, we'll use the online SaaS version, and a dataset found here, ...

Log Sorting with AWS CloudWatch, AWS CloudWatch Insights

 The cool thing is, I was contracted to make these videos in collaboration with CloudAvail Technology Consulting to help people decide which service they wanted to use for their logging - AWS CloudWatch, AWS CloudWatch Insights, DataDog, or New Relic. I'm searching through nginx logs. I have accompanying videos of each service that you can find on the CloudAvail Youtube page; See these links to go to the DataDog and NewRelic posts.   The idea was to be subjective in the videos, but I can be objective on my personal blog.     CloudWatch     The syntax is odd, but easy to grasp. Sort log data by IP addresses, message codes, and status codes. The simplest query system, but not quite robust.   Insights       The syntax has changed - Vastly. I see major SQL influences. You can see that in how the parse function works - in this case, it's often taken pieces of a pre-existing standard - in this case, message - and breaking them into their own c...

Connecting IoT Devices to a Registration Server (Packet Tracer, Cisco)

 If you're seeing this post, I'm helping you, and you probably have LI presence: React and share this post to help me in return.   In Packet Tracer, a demo software made by Cisco Systems. It certainly has changed a lot since 2016. It's almost an Olympic feat to even get started with it now, but it does look snazzy. This is for the new CCNA, that integrates, among other things, IoT and Automation, which I've worked on here before. Instructions here . I don't know if this is an aspect of "Let's make sure people are paying attention and not simply following blindly", or an oversight - The instructions indicate a Meraki Server, when a regular one is the working option here. I have to enable the IoT service on this server. Also, we assign the server an IPv4 address from a DHCP pool instead of giving it a static one. For something that handles our IoT business, perhaps that's safer; Getting a new IPv4 address every week or so is a minimal step against an...