0% found this document useful (0 votes)
49 views22 pages

Advanced Routers Repair Full Arabic P2

The document discusses router configuration and connectivity. It describes configuring hostnames, passwords, and IP addresses on routers. It also covers connecting two routers together over a serial interface and testing connectivity between them by pinging IP addresses. The document then discusses using routers to connect different networks like the internet, printers, and user workstations.

Uploaded by

Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views22 pages

Advanced Routers Repair Full Arabic P2

The document discusses router configuration and connectivity. It describes configuring hostnames, passwords, and IP addresses on routers. It also covers connecting two routers together over a serial interface and testing connectivity between them by pinging IP addresses. The document then discusses using routers to connect different networks like the internet, printers, and user workstations.

Uploaded by

Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

ROUTER

ISSAM SERHAN DYIB

Router > enable


Router # conf t
Router (config) # hostname Waleed
Waleed (config) # line console 0
Waleed (config – line) # password cisco
Waleed (config – line) # login
Waleed (config – line) # exit
Waleed (config) # line VTY 0 4
Waleed (config – line) # password cisco
Waleed (config – line) # login
Waleed (config – line) # exit
Waleed (config) # enable password cisco ! From user – privil.
Waleed (config) # exit
Waleed # disable
Waleed > enable

Password : cisco
Waleed #
Waleed # conf t
Waleed (config) # enable secret class ! From user – privil.
Waleed (config) # exit
Waleed # disable
Waleed > enable
Password : cisco
Password : cisco
ROUTER
ISSAM SERHAN DYIB
Password : cisco
Bad secrets
Waleed > enable
Password : class
Waleed #

Ahmed # conf terminal


Ahmed (config) # Int S0/0
Ahmed (config – if) # IP Address 192.168.15.1 255.255.255.0
Ahmed (config – if) # Clock rate 56000 ! It is DCE (Female)
Ahmed (config – if) # no shut down
Ahmed (config – if) # exit
Ahmed (config) # exit
Ahmed # show int S0/0
Ahmed # show run-conf

Huda # conf terminal


Huda (config) # Int S0/0
Huda (config – if) # IP Address 192.168.15.2 255.255.255.0
Huda (config – if) # no shut down
Huda (config – if) # exit
ROUTER
ISSAM SERHAN DYIB
Huda (config) # exit
Huda # show int S0/0
Huda # show run-conf
Huda # copy run start ! To save the current configuration

Huda # ping 192.168.15.1 ! should work


Ahmed # ping 192.168.15.2 ! Should work

Huda # conf terminal


Huda (config) # Int Fa0/0
Huda (config – if) # IP Address 192.168.14.1 255.255.255.0
Huda (config – if) # no shut down
Huda (config – if) # exit
Huda (config) # exit
Huda # show int Fa0/0
Huda # show run-conf ! Remember this does not work from user

%  +  + 

   %&

RI 86" 1 , 
'  286" ^ 
  K+ &

RI  ;4 5 switch/hub > 286", 4  (1-

static ip V 4#  dhcp  1  ( 286", : "2-


ROUTER
ISSAM SERHAN DYIB

ip/tcp- protocol D  windows - D


 =  K+ $  13-
I + $ 5

86"  

, +G  ( ( 286" ^  ) 
'   86" V '
4-

: 192.168.1.2B5

# ip ;  , 86" B5


NhO,N^j,N,? : B5 R '  5 86"
: " -

Gateway 1I ,
B5  2
#   
Gateway: 192.168.1.1

DNS +' 
D
 %
' 8 V -

<I 3  / Printer % 1 %+  (5-

+  + 
  %(B
%+     %<+6 "  #(DSL)  "
 2+!  \ 86" - 
 

 2+ 'J +  +   DATA Signal. +   %G % 6& "  &  ,4 ,
..  - :( >1 O 86" - :( >1 N 86"  ) =   286"Y V 8
    U+ B5 IP 10.0.0.1 (+  >1-  " 1   +  +
) %'
 % B'  61  86" IP (+ 6# :"+ + ,
.. 1 

. 2+,   = 
 
. :8  = +  +

‫ دم‬2 (2 ‫ ا \ي‬$‫ ا (دي وا او‬$‫ ا او‬, ‫ق‬6 ‫ا‬


ROUTER
ISSAM SERHAN DYIB

,‫م ه‬,TK‫ و‬MP Leased Line ‫ او‬ISDN ‫ن او ال‬,(C!‫ ا‬DE FG,H I)J.K ‫دم‬,$ MN$ ‫ ا'ي‬#H‫او‬# P ‫ ان‬,‫ه‬
IPSharer UCb cCaK Mb‫ا‬,^‫ ا‬dNP‫^] و‬#!^& P UC‫ آ‬JWX‫ود ا‬YK Z[ \$‫^] و‬#!^_ ‫ل‬,E2‫` وا‬Ca‫ ا‬F.NP
.‫ى‬#E&‫ ت ا‬JWX P U!JWj DP#P ‫م‬,Th Interface e‫ ه‬f'‫دم ه‬,.‫ن ا‬g‫ آ‬F.N‫ ا‬e‫ ه‬MH#Jh‫و‬

‫ ت‬Ul,.C NWa‫ ا‬F.N‫ا ا‬


( b   Interface V %  4    - +  +   2+$ V  (+1
 / -   1+ Q Routing   +  +  5   +  + '
D+  + ;
 Packets  4 6 &= Routing Protocols V  % , + *+1 
W+'Y %

:6"   
"

.+'Q, R+1 4 - '  R    + 

# R+  ;" 1-
I$Q +

# 
 2+ 
 +  V! 8# +Z  ;" 2-

dd+  + -

# R +',  I$ +


" R  +  - 

%
  D-  ( Z$ (X ( +$  +4(  ) W+',  I$  + D- :1
$
" 6"  / -  B X  (%# $ 7
#  -) +',  4  B X  +  + @_ +$
+   ;   +  + : 7
#  
 +  +  
 6  >+( 6 2
 

+ 

# 6) *+1 2
  2
#  %+1 / -) *+1 >+(

# V # - ;  
.+' + *+1  ;"     G + D-   I$

:"#  %
' 7#  6"     2

"

ReXf g‫ ه‬cdJ‫ و‬- MNH‫ب آ‬KQ‫ آ‬RST KDUST ‫ى‬WXQY Z K[J‫ز‬K[] ^_ K‫اه‬Ma ^QJ‫ وا‬ADSL Modem ‫ة‬CDE‫ ا‬GHIJKL
‫؟‬kElmJ‫ ا‬KDUST ‫ى‬WXQY ‫ت‬KDEo] ‫ك‬K[‫ان ه‬

:^ep‫ا‬WJ‫ام ا‬WrQst‫^ وا‬JC[UJ‫ام ا‬WrQsuJ ‫ت‬KDEo]1-

k]‫د‬KyJ‫رات ا‬K{UJ‫ ا‬WYW|f‫} و‬aMQaZ‫ ا‬g~Ks‫م و‬Wrf KDa‫[ ا‬XUL MN€ ‫ق‬KIa eƒ ‫ت‬KDEoUJ‫ ا‬vw‫ ه‬gUXf
ROUTER
ISSAM SERHAN DYIB
.‡Q]WrQs‫ي ا‬wJ‫ر ا‬K{UJKL ‫ظ‬K†QTtKL ‫م‬oyf Z k]C|J‫ ا‬gsMf ‫ ان‬WXL KD[dJ‫و‬

^JKQJKL‫ و‬ke]K‫ آ‬KDeYo|f GNIQ{f Z ‫ة‬MNH‫م آ‬CT KDeŠf ‫ن‬KNTZ‫‹ ا‬XL ^_ ‫ت ان‬KDEoUJ‫ ا‬vw‫ب ه‬oNƒ c] ًK‰Y‫ا‬
.‫م‬C|J‫ ا‬vw‫ ه‬Wy†f

:‫ة‬MN€ŠJ‫Œ ا‬fKdUeJ ‫م‬WrQ{f ‫ت‬KDEo]2-

}aMQaZ‫ ا‬gm] KD[] MH‫ت اآ‬KHdL JKŠY‘L ‫م‬oyf‫ و‬- MHXUJ‫[^ ا‬Xf ^‫ وه‬KDNeƒ Gateway ŒyJ ‫ق‬l‫ إ‬RQY
}aMQaZ‫ ا‬kdH’ eƒ “y_ WT‫ز وا‬KDS‫ آ‬MD”f ‫•ن‬L KDNeƒ gUXf MfoNHU‫ة آ‬CDE‫ة ا‬Wƒ gXSf KDa‫ ا‬KDf‫ا‬CNU] c]‫و‬
Residental Gatewar

:‫ى‬MHdJ‫ت ا‬K{s–UJ‫ق ا‬KIa eƒ ‫م‬WrQ{f ‫ت‬KDEo]3-

MHQXf ISPs }aMQaZ‫ ا‬k]Wp WY‫و‬Cf C‫اآ‬M]‫ت و‬KX]KSJ‫ _^ ا‬K‫ده‬oE‫ و‬cdUY‫ و‬Rr— ‫ة‬CDEZ‫ ا‬vw‫ ه‬RST ‫ن‬odY
Level 3 Model˜eIŠ] KU~‫ دا‬KDNeƒ ™eIY‫ و‬KDL ‫م‬oyf ^QJ‫ة ا‬WXJ‫ت ا‬K]WreJ ً‫ا‬M”a ‫ت‬KDEoUJ‫ ا‬g‰_‫ ا‬c]

"n| ‫)"ت ا‬1 ‫ ا‬P] 2M4# ‫


&ة ا‬9‫ا‬
  286"Y / - 
'  %B  %
%6"  dsl 
  1 + J -
#Y =       1 + 86" -) Router N
 ) , 
  !) %, 286"Y %$=\  W+'Y %6"   +   % +J

"  ( dsl ) %"+' % : %'


 % 1+ 6$    +    l   
2++I E  +  + : S

   286"Q

 2
  *1 $ %$+1 286"Y %   4\ +  + 1 + 86" - Access point2)
, %    I+Y +
 $  ,  286"Q ; 1 + +  + D
  J ) +  +
I+Y +
 +  +  1+ 5 +
 $  EQ :I D $ 5 +
 4
), 5 +
   %   7  

R ' +
$ +'[ +  + +
$ +  +  J ) ,    1+ - Bridge(3)
( 61+ %  C
+ 86" C # $
ROUTER
ISSAM SERHAN DYIB

SpeedTouch‫ــ‬J‫ ا‬CE‫@ ?>= راو‬ABCD

CE‫او‬CJ‫ دي ا‬MN OPQRSJ

‫ااااااا‬VW‫ ه‬TU
ROUTER
ISSAM SERHAN DYIB

`EVE ]P>YJ‫ ا‬CE‫@ إ^]اد راو‬P[P\J @>YWJVZ


‫ن‬b\B V>JVa b‫ع وه‬b>dU ef‫ز ر‬VhiJ‫ ا‬jU ]kbB

192.168.0.1

10.0.0.138

ef‫أو اي ر‬

CE‫او‬CJ‫@ ا‬R[} zS[PJ Control+Enter VrU CSu‫إ‬+‫ل‬bSub‫ آ‬wxsE ey z[{SQJ‫ ا‬op^ qrsE
ROUTER
ISSAM SERHAN DYIB

‫€^]ادات‬VZ ‫>]أ‬u M\J ‫]ة‬B]k @R[} VWrU zS[E

. MAPARJ‫س ا‬VAQJVZ ‫ر‬b{J‫ض ا‬CrJ wBC„J‫ ه‚ا ا‬op^ CAu .. Cx{U ‫رة‬b{J‫ه‚ ا‬
ROUTER
ISSAM SERHAN DYIB

Bridge CE‫]ون راو‬Z ]BCu O‫` ؛ ه‬EVE ]P>YJ‫ ا‬CE‫‡]ام راو‬SN‫] إ‬B]RE VWPp^ VW‫ه‬

Router CE‫ راو‬OQrB M\J ‫أو‬

CE‫او‬CJ‫‚ا ا‬hZ @r‰‫Šة را‬PU ‚‫وه‬


ROUTER
ISSAM SERHAN DYIB

‫ة‬bd‹ e‫ أه‬VW‫ه‬
ROUTER
ISSAM SERHAN DYIB
)‫ت‬V{E€‫ر ?>\@ ا‬VS‡E) ‫‡]م‬SYQJ‫ ا‬eN‫ إ‬T^ ‫رة‬V>^ b‫ وه‬: User Name ‫ر اŒول‬VP‡J‫ا‬

@‫آ‬C„J‫ ا‬O>f TU =J ‫Šود‬QJ‫= وا‬P ‫ص‬V‡J‫ي ا‬CYJ‫ ا‬efCJ‫ ا‬qP jsE : Password MuVŽJ‫ر ا‬VP‡J‫ا‬

NextV‫]ه‬rZ‫ي و‬CYJ‫ ا‬efCJ‫] ا‬P‫’آ‬SZ ‫ص‬V‹ b‫ وه‬: Confirm Password ‘JVŽJ‫ر ا‬VP‡J‫ا‬

‫ء‬M? ‫] أي‬B]RE ‫ ^]م‬jPdSYE‫ورد ؛ و‬bNVZ‫ و‬ePu ‫زر‬bPZ ‫ إ‬CE‫او‬CJ‫ ا‬op^ ‫ل‬b‹]J‫ ا”] ا‬jPdSYB  M\J =Z ‫ص‬V‹ ‫ورد‬bNVZ‫ و‬ePu ‫زر‬bB j“‫ و‬jPdSYE VW‫ه‬
CE‫او‬CJ‫دة إ^]اد ا‬V^‫] إ‬W^ ‫ل‬b‹]J‫ ا‬zBC{E‫ و‬eN€‫= ا‬WU –pdB  ‫‚ا‬hZ‫ و‬Vh‫آ‬CE‫و‬
ROUTER
ISSAM SERHAN DYIB
ROUTER
ISSAM SERHAN DYIB
ROUTER
ISSAM SERHAN DYIB
ROUTER
ISSAM SERHAN DYIB

%  *+ '  +  + :   

4# 7# A
+&  + , 1' $ %+   4# >Q Q %+1 
 K  $
"
  A ADSL Router B'  A
#  ADSL 1' $ %+  % ! V %+  2

:-  11'  ># ((Y V > #)  j 4

Users ----> ADSL Router (Firewall) ---> Internet

).6"+'  % '


 ) % Q +1'! ;"  6J$ + , 4 6$   % Y 7#

6I  + #Q R  Y %#  2



  ;"  %+1 / 6 + , %+ %+1
.+  + :    V! %$I! 4&   

:- 6      -, >" %<+ 1 % 5 D-


+  + V 2+1 % !1-
0 +
  $+  W
 % < 01'Q2-
+ +
" :    3-
:< + DHCP  + :    4-
; 2+  8# ;& +  + V Listening  5-
2+1'  % -, V6  $   V 4# 6-
GateWay%1# / ' 7-
% 6 =#B 8-

:+  + V 2+1 % !1-

 - &$ % 0I V + , :8     +  + V 2+1 +6 1  !

% / 6 b +  , 7# A Networks Hacker  *+ ' +6 - V  %#
( $ A + , V % B'  + 6 +    %
+
 " A  6  1 A ; 
% +
   $ A4, +
 ;    

" +
 2

" %I 0 +6
  %# / - $ , A ; " + 2
  +  + 3  ; (
 , ;  :
 ;  4,
.2+  V 
9
( 2+1'  $J  +6

:0 +
  $+  W
 % < 01'Q2-

 %6 + %  :I +  + >#4  % +


 
 - +  8+6 D#I 


 $ A +  + V %+ %  :I , #  Default %4, %  +G V #
Port &  *+1  +  + 4 , , +6 V >" , A +  + V %+ %  :I
A +  + 1I $ 
 +
   # & Telnet &  (, =  U &
A E  8
 0 ) 2
%1  +  + 4 , , D  $ %6 %+   W+ # 
ROUTER
ISSAM SERHAN DYIB
Q Dictionary % *+1  0  %+1 J %+   >+" %   ( I$ E
 D J 6 5  %+ %  V 4# R  V  IH &$BruteForce
 #  Default %4, 6& %+ %   #Q  A =

" +
0J
Username .+
 Y %6

:+ +
" :    3-

;    %$+  (
  + +
" E Servers  P' ) + +
" D $+

 6
' 
  % ,     # 2+$ +1    ( A % D  #  I DJ$
  A % 4  %6  0  %+- %   
 -  A
# m  %+1 #"
 8#    
 V +  + 1I   Trace V4   %#B   V'  R'
$ ( 3  m 0  
( I $ 4&  %  U+ ( R A

#    

' >"#  A + , % '
 P', : D  + +
" 7# A   
% D 34 I  A & 
'  2
 S +   KaZaA 5 6 %4'
.6'
 % C+'  ,4 Y ;#  7#  +  + # 

DHCP : + :    4-

 + -  7# Dynamic Host Control Protocol % " +4 ' -DHCP
B'  D  A % $ %I 6<1 ; D  A % $ P'n IP  :8 
- +  ) %  2
& ,  ;' %I 4# % 4   $ A % 4 ,
 % 
&  D  6  +6 :1  # D-   A (&  +$ 
+ 
1  ) +6
" B5 $ A) "+' 4 E  '
  6 B4  ) 1$ /
# -
+ 
/
# %  2
& ,  4# -
+  A % B4 # ( +  + * + '
+ , J1 % ;"  -  6
" + R 8   2+ & / - $ B5 $ % 2+ &
IP   01 +  +  %  7# DHCP 1I %4'  +  + 
 $

#  I    A % $ %I D   


# -  6 /# 4#  1$
V +

# - A % $ %I V 4# V +
( P'MAC Adress
$ %I V 4# , ;J$ % V +' P'  '
 
  A %  2
& ,
$ (
) % IP   V IP ;  1I  (  +', P' - #  6  A %
.%I V 4#

:; 2+  8# ;& +  + V Listening  5-

+ %   % $

#   V 6+1 *   6 % 8#  A %+1 / - %1 


 + J) +  + $ A 2+I
  + +I V 6<  # 
  64#&    +  +
V   A +6

#  ># & 2
 
#  R V ; 2+  8# : " 8'  (+6
+
4 P#& D  -
 A * I $ (  6 #+
(  Sniffing 6& % 
ROUTER
ISSAM SERHAN DYIB
.+  =  Hex  ,
 6 < +( D  ASCII V 6#   8#

:2+1'  % -, V6  $   V 4# 6-

 A 6 :  ISP : % / 6 User & Pass %$+ D  +  + V %   D +1
 $
4  J   PPP : Point to Point Protocol  + 1I & P#$ B'
 % %4' DNS   4# V D +
( V %$I, A R - 1' *+1  ISP :
   V 4# A + ,
+   V 4# D J A
, V ;B
V %$I, PC ID - MAC Adress - Time Taken   5 % V P'
#  + , /
+ A % >#4 R - (+ 5 6$+  D  2+1' %G  
.; 

GateWay :%1# / ' 7-

%+-   $ ;
'   Server  V / ' D J ;J$ +  + V +1  +
( 
4 5 U & + %1   +  *+1  ; 4 DJ$ A %( +H # 
  ++ %#I >#   GateWay  Server - %#I  + ) %#I
<,
  :1 -
 $ A +  +  Logs 3 D J %   D<6  D
 Trojan)
.+  +  Ping   % V %$I, A D

Hacker ----> Internet ----> Hacked Router(GateWay) ---> Internet ---->


Victim

Passive %+1 V Tracing V4  %#I ( J$ A Bouncing %  / - V 
.D  $   " -
  A *+ '  +  +  ;  :1 R$Trace

:-% 6 =#B 8-

I  A OutBound % C+' V '


 ,4 , #  -

#  +&  -
InBound.% '
V C+'  4  

#Q - '
 A "+'  '
IP (  V 4# ;J$ +  + G
-
)#Q.XXX.XXX jO,Nh] 6$ "+'  A 10.0.0.1Q NhO,N^j,N,N

1'
#  A %<8$ $ 2
 #   86" D

# 
4 , J$ +  +  
-
$ >G  +  +    >#     # A RJ45"Q  +', ADSL
. : W( ;Y Linux =
"  , / -
ROUTER
ISSAM SERHAN DYIB

CE‫او‬CJ‫‡]ام ا‬SNVZ TB‫ز‬Vhk TU CŽ‫ اآ‬TPZ qdPYZ qP\pN q\>? ‫ا^]اد‬

‫ ان‬jPdSYE ‘P” qu‫و‬CU CŽ‫= اآ‬ZbNV” jU OUVrSJ‫ ا‬qPpQ^ OriE qP\pN¡J‫ت ا‬V\>„J‫ ا‬VPkbJbW\E ‫ل‬VQrSN‫ان ا‬
‫ء‬VRu‫ ا‬M OAWSE ¢u‫ و ا‬qPp^ qps[QJ‫= ا‬ZVrJVZ opYSE ‫ ان‬oS” ‫ و‬q}V‡J‫= ا‬U¡‫ه] ا‬V„E ‫ و‬¢uCSu‫ ا‬z[{SE
.¡{SU ‫ن‬b\E VQ‰‫= دا‬u =J‫= و ذ‬JŠWU
‫ات‬bd‡J‫ ا‬TU q^bQiU j>Su =Z ‫ص‬V‡J‫ب ا‬bNVRJ‫ز ا‬VhiJ qP\pN q\>? qV“‫ان ا‬
routers‫ات‬CE‫او‬CJ‫ و ا‬jdAJ‫ر ادوات و ا‬VPS‹‫ا‬1-
‫ و ادوات‬jdAJ‫ ا‬OP}bSZ ‫م‬bAu2-
‫ و ادوات‬jdAJ‫ ا^]ادات ا‬w>“3-
q\>„J‫ ا‬oJ‫= ا‬Z ‫ص‬V‡J‫ب ا‬bNVRJ‫ ا‬OP}bE4-
routers‫ات‬CE‫او‬CJ‫ و ا‬jdAJ‫ر ادوات و ا‬VPS‹‫ا‬1-
wireless Router M\pN CE‫ أ( راو‬TP¥P? oJ‫ج ا‬VSRu VW‫ و ه‬qU‫¡ز‬J‫ر ادوات ا‬VPS‹VZ M‫ ه‬oJ‫ او‬bd‡J‫ا‬
‫ق‬bYJ‫ ا‬M CbSU VhrPQk ‫ و‬Wireless network adapter M\pN q\>? ‫ت‬C‫وب( آ‬
op^ qP\pN‫رة ا‬V?‫ ا‬qB‫ز‬bSZ ‫م‬bAE MSJ‫ز او اداة ا‬VhiJ‫ ا‬b‫ ه‬Wirelss Router M\pN¡J‫ ا‬CE‫او‬CJ‫ان ا‬
‫رة‬V?‫ ا‬C>^ qPWrQJ‫Ё ا‬hk‫ ا‬oJ‫ل ا‬V{E‫ ا‬jB‫ز‬bE ‫ و‬¢uCSuVZ ‫ل‬V{E‫ ا‬qPpQrZ ‫م‬bAB VsB‫ و ا‬qPWrQJ‫Ё ا‬hk‫ا‬
Vu‫ر اد‬b{J‫ ا‬C¨u‫ ا‬. qP\pN¡J‫ا‬

‫م‬bAB ‫= و‬Z ‫ص‬V‡J‫ب ا‬bNVRJ‫ ا‬op^ –‫آ‬CP wireless network adapter M\pN‫ اا‬q\>„J‫ت ا‬C‫ آ‬VU‫ا‬
Vu‫رة اد‬b{J‫ ا‬C¨u‫ ا‬Wireless Router . M\pN‫ ا‬CE‫او‬CJ‫ ا‬jU ‫ب‬bNVRJ‫زك ا‬Vhk O}‫ و‬qPpQrZ
Pic2

‫ و ادوات‬jdAJ‫ ا‬OP}bE2-
eB]f CE‫ او اي راو‬eB‫د‬bQJ‫ب و ا‬bNVRJ‫ ا‬TPZ qJb}bQJ‫ ا‬qP\pYJ‫ ا‬q\>„JVZ q}V‡J‫¡ت ا‬ZV\J‫ ا‬qJ‫زا‬VZ ‫م‬bAu(‫أ‬
‘PRZ RJ45 ‫ راس‬qJ ‫‚ي‬J‫دي ا‬VrJ‫ ا‬q\>„J‫= ا‬pN qdN‫ا‬bZ M\pN‫ ا‬CE‫او‬CJVZDSL ‫ ال‬eB‫د‬bU OP}bSZ ‫م‬bAu(‫ب‬
Wireless ¢uCSu¡J ª{‡QJ‫رت ا‬b>J‫ ا‬M M\pN‫ ا‬CE‫او‬CJ‫ ا‬M MuVŽJ‫ و ا‬eB‫د‬bQJ‫ ا‬M ‫ اول‬qCD ‫ن‬b\B
‫ر‬b{J‫ ا‬VQ‫آ‬Router Internet port
Pic3
ROUTER
ISSAM SERHAN DYIB
‫ر‬b{J‫ ا‬VQ‫ آ‬qPp^ ¢uCSuVZ ‫ص‬V‡J‫رت ا‬b>J‫ ا‬q‰V“‫¡”« ا‬u ‫ و‬CE‫او‬CJ‫ و ا‬eB‫د‬bQJ‫ ا‬OPx„SZ ‫م‬bAu
Pic4

Configure the wireless router M\pN‫ ا‬CE‫او‬CpJ ‫ ا^]ادات‬w>“3-


=J‫ب و ذ‬bNVRJ‫ ا‬M ‫دي‬VrJ‫ ا‬q\>„J‫ت ا‬C\Z qrU MEVB ‫‚ي‬J‫= ا‬pYJVZ qpP}bSZ ‫م‬bAu M\pN¡J‫ ا‬CE‫او‬CJ‫ ا‬OPx„E ]rZ
‫= ازرق‬pYJ‫ر و ”« ا‬b{J‫ ا‬oJ‫ ا‬C¨u‫ ا‬.qPp^ qP\pN¡J‫ ا‬q\>„J‫¬ ا‬BCrE ‫ و‬qE‫ ا^]ادا‬w>“ ‫ و‬qSiUC>Z ‫م‬bAWJ
Pic5

pic 6

MSJ‫ و ا‬CE‫او‬CJ‫^]ادات ا‬VZ q}V‡J‫ ا‬qR[{J‫ ا‬op^ O‹]u ‫ و‬Internet Explorer ‫ر‬bp>Y‫ اآ‬¢uCSWJ‫ ا‬zS[u
MEVB ‫‚ي‬J‫ ا‬manual ‫‡]ام‬SN‫ ا‬OPJ‫ د‬TU qPp^ ‫ل‬b{RJ‫ ا‬T\QB ‫ و‬qZ ‫ص‬V‹ IP address T^ ‫ر‬V>^ ‫ن‬b\E
qrU
Pic7

M\pN‫ ا‬CE‫او‬CJVZ ‫ن‬VS}V‡J‫ور ا‬CQJ‫ ا‬qQp‫‡]م و آ‬SYQJ‫ ا‬eN‫ ا‬O‹]u


Pic8

M ‫]او‬E CŽ‫رة و اآ‬bh„QJ‫ات ا‬CE‫او‬CJ‫ ا‬TU q^bQiQJ ip address ‫ و ال‬CYJ‫ ا‬qQp‫‡]م و آ‬SYQJ‫ ا‬eN‫ ا‬VW‫ه‬
‫ق‬bYJ‫ا‬
ROUTER
ISSAM SERHAN DYIB
RouterAddress Username Password
admin Adminhttp://192.168.1.13Com
admin (leave blank)http://192.168.0.1D-Link
admin Adminhttp://192.168.1.1Linksys
admin passwordhttp://192.168.0.1Netgear
‫رة‬b{J‫ ا‬VQ‫ آ‬Wireless Tab M\pN –Bb>SJ‫ ا‬T^ ‘R>u VhWU ‫ ا^]ادات و‬qR[} zS[E ‫ف‬bN ‫ان‬
qPSJV” M CE‫او‬CJ‫ل ا‬VQrSN‫ ا‬op^ TB‫در‬Vf ‫ن‬b\u oS” =J‫وذ‬Mixed ‫ ل‬q\>„J‫ع ا‬bWJ ‫ ^]ادات‬w>sZ ‫م‬bAu
qP\pN¡J‫ و ا‬qP\pYJ‫ا‬
.‫ر‬VS‡E ‫ء‬M? ‫ن اي‬b\B ‫ ان‬T\QB ‫و‬SSID or naming your network ‫ و‬quV‹ M q\>„pJ VQN‫ ا‬jsu
save sittings ‫Šر‬J‫ ا‬op^ wx“VZ ‫[« ا^]ادات‬Ru ey Enable ‫ر‬VP‡J‫ ا‬Or[u
Pic9

SSID or naming your networkqBVQRJ‫ ا^]ادات ا‬oJ‫ان ا‬


wireless security qP\pN‫ ا‬q\>„J‫ ا‬qBVQ” ‫ و‬TUVZ ‫ص‬V‡J‫– ا‬Bb>SJ‫ ا‬oJ‫‚ه– ا‬u
Pic10

‫ء‬M? ‫ اي‬phrases jZCU M jsu ey ¢Z ١٢٨ VW‫ و ه‬web encryption CP[„SJ‫ع ا‬bu ‫ر او‬VS‡u
key1 , key2 , key3 M ‫م‬Vf‫ ار‬TU q^bQiU VWJ Ch¨E ‫ و‬Generate ‫Šر‬J‫ ا‬op^ wxsu ‫] و‬BCu
‫ف‬bN =u ]WSYU M Vh¨[” ‫ و‬Vh‡YWZ ‫م‬bAE ‫ او ان‬Vh>S\E ‫– ان‬iB ‚‫ وه‬CP[„SJ‫ ا‬zPEV[U M‫و ه‬,key4
]rZ VQP VhkVSRE
qP\pN¡J‫ ا‬q\>„JVZ ‫ل‬V{E¡J ‫ب‬bNVRJ‫ز ا‬Vhk ‫ا^]اد‬4-
q\>„J‫ت ا‬C‫¬ آ‬Psu ey M\pN‫ ا‬CE‫او‬CJ‫ب و ا‬bNVRJ‫ ا‬TPZ O{SQJ‫= ازرق ا‬pYJ‫ ا‬O{[E ‫ ان‬jPdSYE ‫ان‬
‫ب‬bNVRJ‫ ا‬oJ‫ ا‬M\pN‫ا‬
P

q}V‡J‫ ا‬²U‫ا‬C>J‫ ا‬¢P>ŽE ‫ب و‬bNVRJ‫ ا‬oJ‫ ا‬q[BCrSZ ‫م‬bAu ‫[¡ش و‬J‫ ا‬q>„E USB qrdf T^ ‫ر‬V>^ b‫ ه‬VW‫وه‬ic12
ROUTER
ISSAM SERHAN DYIB
q^VYJ‫– ا‬uViZ Ch¨E MSJ‫ ا‬qubAB‫¡”« ا‬u V‫]ه‬W^ ‫هŠا و‬Vk z>{B oS” ³CQJ‫ص ا‬CAJ‫ ا‬TU ‫ت‬V[BCrSJ‫ و ا‬qZ
Pic13

TQB‫Šر ا‬JVZ VhPp^ ‫ر‬V[JVZ wxsJVZ ‫م‬bAu ‫و‬


Pic14

view available wireless network ‫ر‬VS‡u ‫و‬


‫ و‬oprJ M ‫ ا^]ادات‬M qr“bZ VWQf ‫‚ي‬J‫ ا‬q\>„J‫ ا‬eN‫ ا‬op^ ‫ي‬bSRE Vhu‫¡”« ا‬u ‫ و‬qPJVSJ‫ ا‬q?V„J‫ ا‬VWJ Ch¨E ‫و‬
qWU‫ ا‬q\>N Vhu‫ ا‬op^ ‫]ل‬B ‫‚ي‬J‫ ا‬O[AJ‫Š ا‬U‫”« ر‬
Pic15

VWQf VU b‫ و ه‬q\>„J‫ح ا‬VS[U ‫ل‬V‹‫د‬VZ –JVdB ‫‚ي‬J‫ار ا‬bRJ‫ ا‬jZCU Ch¨B V‫]ه‬W^ ‫ و‬connect ‫Šر‬J‫ ا‬op^ wxsu
‫ة ا^]ادات ا‬bd‹ M V>uVk qSZVS\Z

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy