How To Setup A Wireless Router

12 comments
Setting up a Belkin Wireless Router.
Network diagram :




















Step 1 : Find default gateway address
  • Firstly, after setting up the network as the diagram above, once the power is on for all device press the reset button on the router for at least 10 seconds.
  • Then in ur computer Go Start -> Run -> type CMD -> type ipconfig
  • Find a address under default gateway (exp: 192.168.1.1)



Step 2 : Accessing Router Setings

  • Open any browser( ie, mozilla, chrome...)
  • Type the default gateway address you've obtained from Step 1 in the URL address space.
  • If your are prompt to enter password as below LEAVE IT EMPTY and click submit.
  • If you dont know the password, check this website for default router password here Router pass 1 or Router Pass 2 
Step 3: Set up network name 


  • Click Wireless tab -> click Channel and SSID->  rename to the name u desire in the SSID > area.   ( i named mine belkin54g )  **this name is the broadcast name viewed by everyone who needs to connect this connection.
  • Make sure the box Broadcast SSID is checked.
  • Click Apply Changes.



Step 3: Set up security mode
  • Click Security under Wireless tab
  • Change the Security mode from Disabled to WPA-PSK(no-server)
  • Enter a password at the pre-shared key(PSK) area. 
  • Click Apply Changes.

**Note this password is used by everyone who needs to connect to the wireless router for internet access.




Step 4(optional): Configure admin password
  • Under Utilities tab click System Settings
  • Leave blank for Current Password
  • Type in a new password and confirm it ** This password is set to access the router settings.
  • Change the time zone to KL Singapore
  • Under Remote Management -> check the box which says any IP can remotely manage this router
  • Click Apply Changes below and exit.





DDoS Attack

1 comments
Introduction

Distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users
In lay man term, it's a concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all.
DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing it's communication.
To neutralize common DoS attack methods like Deauth Floods, look for newer products that support 802.11w management frame protection. 

Symptoms and Manifestations

  • Unusually slow network performance (opening files or accessing web sites)
  • Unavailability of a particular web site
  • Inability to access any web site
  • Dramatic increase in the number of spam emails received—(this type of DoS attack is considered an e-mail bomb)

Methods of attack

The five basic types of attack are:

  1. Consumption of resources; such as bandwidth, disk space, or processor time
  2. Disruption of configuration information, such as routing information.
  3. Disruption of state information, such as unsolicited resetting of TCP sessions.
  4. Disruption of physical network components.
  5. Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
A DoS attack may include execution of malware intended to:
  • Max out the processor's usage, preventing any work from occurring.
  • Trigger errors in the microcode of the machine.
  • Trigger errors in the sequencing of instructions, so as to force the computer into an unstable state or lock-up.
  • Exploit errors in the operating system, causing resource starvation and/or thrashing, i.e. to use up all available facilities so no real work can be accomplished.
  • Crash the operating system itself.

Popular DDoS Attack Technique

1) ICMP flood
Includes  Smurf attack, Ping flood, Ping of death, and SYN flood.
A smurf attack is one particular variant of a flooding DoS attack on the public Internet. It relies on misconfigured network devices that allow packets to be sent to all computer hosts on a particular network via the broadcast address of the network. The network then serves as a smurf amplifier.

In other attacks, the perpetrators will send large numbers of IP packets with the source address faked to appear to be the address of the victim. The network's bandwidth is quickly used up, preventing legitimate packets from getting through to their destination. a perpetrator sends a large amount of ICMP echo request (ping) traffic to IP broadcast addresses, all of which have a spoofed source IP address of the intended victim. If the routing device delivering traffic to those broadcast addresses delivers the IP broadcast to all hosts (for example via a layer 2 broadcast), most hosts on that IP network will take the ICMP echo request and reply to it with an echo reply, multiplying the traffic by the number of hosts responding. On a multi-access broadcast network, hundreds of machines might reply to each packet
The fix :
  • Configure individual hosts and routers not to respond to ping requests or broadcasts.
  • Configure routers not to forward packets directed to broadcast addresses
  • Router(config-if)# no ip directed-broadcast

2) Teardrop Attack

Teardrop attack involves sending mangled IP fragments with overlapping, over-sized payloads to the target machine. This can crash various operating system due to a bug in their TCP/IP fragmentation re-assembly code. WinXP(SP1) and lower version are vulnerable to this sort of attack.

 

3)P2P Attack

The most aggressive of these peer-to-peer DDoas attacks exploits DC++. Peer-to-peer attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and the attacker does not have to communicate with the clients it subverts. Instead, the attackers acts as a "pupper master", instructing clients of large peer-to-peer file sharing hubs to disconnect from their peer-to-peer network and to connect to the victim's website instead. As a result, several thousand computers may aggressively try to connect to a target website. While a typical web server can handle a few hundred connections/sec before performance begins to degrade, most web serves fail almost instantly under five or six thousand connections/sec.


4) Nuke

A Nuke is an old denial-of-service attack against computer networks consisting of fragmented or otherwise invalid ICMP packets sent to the target, achieved by using a modified ping
utility to repeatedly send this corrupt data, thus slowing down the affected computer until it comes to a complete stop.
A specific example of a nuke attack that gained some prominence is the WinNuke, which exploited the vulnerability in the NetBIOS handler in Windows 95. A string of out-of-band data was sent to TCP port 139 of the victim's machine, causing it to lock up and display a Blue Screen of Death (BSOD).


Prevention and response

1) Firewalls

Firewalls have simple rules such as to allow or deny protocols, ports or IP addresses. Firewalls can effectively prevent users from launching simple flooding type attacks from machines behind the firewall.
Some stateful firewalls like OpenBSD's pF, can act as a proxy for connections, the handshake is validated (with the client) instead of simply forwarding the packet to the destination.

2) Switches

Most switches have some rate-limiting and ACL capability. Some switches provide automatic and/or system-wide rate limiting, traffic shaping, delayed binding (TCP splicing)(prevents SYN Flood), deep packet inspection(prevent DoS) and Bogon filtering (bogus IP filtering)(prevent dark address) to detect and remediate denial of service attacks through automatic rate filtering(work with rite rate-thresholds) and WAN Link failover(prevent DoS/DDoS) and balancing.

3) Routers

Most routers can be easily overwhelmed under DoS attack. If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter. Cisco IOS has features that prevents flooding, i.e. example settings.[32]

4) Application front end hardware

Application front end hardware is intelligent hardware placed on the network before traffic reaches the servers. Application front end hardware analyzes data packets as they enter the system, and then identifies them as priority, regular, or dangerous. There are more than 25 bandwidth management vendors. Hardware acceleration is key to bandwidth management. Look for granularity of bandwidth management, hardware acceleration, and automation while selecting an appliance.

5) IPS based prevention

 Intrusion-prevention systems which work on content recognition cannot block behavior-based DoS attacks.
An ASIC based IPS can detect and block denial of service attacks because they have the processing power and the granularity to analyze the attacks and act like a circuit breaker in an automated way.
A rate-based IPS (RBIPS) must analyze traffic granularly and continuously monitor the traffic pattern and determine if there is traffic anomaly. It must let the legitimate traffic flow while blocking the DoS attack traffic.

6) Prevention via proactive testing

Test platforms such as Mu Dynamics' Service Analyzer are available to perform simulated denial-of-service attacks that can be used to evaluate defensive mechanisms such IPS, RBIPS, as well as the popular denial-of-service mitigation products from Arbor Networks. An example of proactive testing of denial-of-service throttling capabilities in a switch was performed in 2008: The Juniper EX 4200 switch with integrated denial-of-service throttling was tested by Network Test and the resulting review was published in Network World.

7) Blackholing/Sinkholing

With blackholing, all the traffic to the attacked DNS or IP address is sent to a "black hole" (null interface, non-existent server, ...)
Sinkholing routes to a valid IP address which analyzes traffic and reject bad ones. Sinkholing is not efficient for most severe attacks.

8) Clean pipes

All traffic is passed through a "cleaning center" via a proxy, which separates "bad" traffic (DDoS and also other common internet attacks) and only sends good traffic beyond to the server. The provider needs central connectivity to the Internet to manage this kind of service.
Prolexic and Verisign are examples of providers of this service
______________________________________________________________

Cited from CNET
How a "denial of service" attack works
In a typical connection, the user sends a message asking the server to authenticate it. The server returns the authentication approval to the user. The user acknowledges this approval and then is allowed onto the server.
In a denial of service attack, the user sends several authentication requests to the server, filling it up. All requests have false return addresses, so the server can't find the user when it tries to send the authentication approval. The server waits, sometimes more than a minute, before closing the connection. When it does close the connection, the attacker sends a new batch of forged requests, and the process begins again--tying up the service indefinitely.
Typical connection





"Denial of service" attack






How to block a "denial of service" attack
One of the more common methods of blocking a "denial of service" attack is to set up a filter, or "sniffer," on a network before a stream of information reaches a site's Web servers. The filter can look for attacks by noticing patterns or identifiers contained in the information. If a pattern comes in frequently, the filter can be instructed to block messages containing that pattern, protecting the Web servers from having their lines tied up.






_____________________________________________________________________________________________

Decide what you want rite now !!!

1 comments
In order to get what you want, you must first decide what you want. Most people get stuck at this crucial first step because they simply cant's see how it's possible to get what they want - so they don't even let themselves want it. Don't sabotage yourself that way! What we now know about how the brain works is that you must first decide WHAT you want, before your brain can figure out HOW to get it.

Always dream and shoot higher than you know you can do. Don't bother just to be better that ur contemporaries or predecessors. Try to be better than yourself.
-William Faulkner

Straight, Crossover, Roll-Over and Console Cable with HyperTerminal

27 comments
Difference Between Straight Through, Crossover, And Rollover Cables
The Purpose of Straight-Through Cables
Straight-through cables get their name from how they are made. Out of the 8 pins that exist on both ends of an Ethernet cable, each pin connects to the same pin on the opposite side. Review the diagram below for a visual example:

This kind of wiring diagram is part of the 568A standard.

Straight-through cables are primarily used for connecting unlike devices.
    * 1. Connecting a router to a hub
    * 2. Connecting a computer to a swtich
    * 3. Connecting a LAN port to a switch, hub, or computer
_________________________________________________________________________________________
The Purpose of Crossover Cables
Crossover cables have pairs of wires that crisscross. This allows for two devices to communicate at the same time

Switch the orange-white and green-white wires, and then the orange and green wires. This will enable like devices to communicate.


Use crossover cables to connect like devices.
    * 1. Connecting a computer to a router(exceptional)
    * 2. Connecting a computer to a computer
    * 3. Connecting a router to a router
    * 4. Connecting a switch to a switch
    * 5. Connecting a hub to a hub
_________________________________________________________________________________________
The Purpose of Rollover Cables
Rollover cables essentially have one end of the cable wired exactly opposite from the other.  Rollover cables, also called Yost cables, usually connect a device to a router or switch’s console port. This allows a programmer to make a connection to the router or switch, and program it as needed.

Notice that each wire is simply “rolled over.” These types of cables are generally not used very much, so are usually colored differently from other types of cables.
_________________________________________________________________________________________

The Console Cable
Console cable are mainly used to configure CISCO routers or switch using HyperTerminal

Don’t plug it into the Ethernet port!   Remember, it is a Serial Cable.
You need to connect it to the 9 PIN serial port on your PC  and the other end to a router at the console port(not Ethernet port).

Once connection is done you need to use your terminal emulator to communicate with the console port.




_________________________________________________________________________________________

Find MAC address

0 comments
Find MAC address in Win XP
1. Open Windows Start menu.
2. Select Run. Type: command and click OK.
3. At the blinking cursor, type: ipconfig /all and press Enter.

i. Look for these entries near the end of the list:
- Dhcp Enabled. No means your IP address is static. Yes means it is dynamic.
- IP Address. This is your current IP address.To exit, at the blinking cursor, type: exit and press Enter.
ii. If your current IP address is:
- Static, then make note of the IP address. You need the IP address when you open ports in your router or firewall.
- Dynamic, then assign a static IP address instead. \
- Physical Address , is known as MAC address



OR







1. Open Windows Start menu.
2. Open Control Panel.
3. Classic view: Open Network Connections
Category view: Select Network and Internet Connections, and then Network Connections.
4. Double-click on your active LAN or Internet connection.
5. Click Properties.
6. This opens the Local Area Connections Properties window.
7. In the General tab, highlight the Internet Protocol (TCP/IP) item, and click Properties. This opens the Internet Protocol (TCP/IP) Properties window



8. In the General tab, click Use the following IP address, and enter:

- IP address. The static IP address you want to assign to this computer.- Subnet mask. Subnet mask used by your router.
- Default gateway. IP address of your router's default gateway.In Use the following DNS server addresses, enter all the IP addressses for the DNS servers your router uses.

9. Click OK.

Then:
10. Click OK to close each window.
11. Restart your computer.
12. Then, check your IP address again, to make sure that the changes were applied.




Find MAC address in Windows Vista

1.  Check the double computer icon in the task bar.

2. Right click and select Network and Sharing Center


3. Under connection, click View Status of the Local Area Connection.


4. Under speed, click details and you can view physical address( also known as MAC address) and the IP address.

OR

1. Click the Windows Start button and type cmd in the Start Search field, then hit enter to open the command prompt.


2. If using the Classic Start Menu: Click the Run button in the Windows Start Menu.

3. Type cmd in the open prompt of the Run menu and click OK to launch a command prompt window.

4. Type ipconfig /all at the command prompt to check the network card settings.


5. The IP number and MAC address are listed by ipconfig under IP Address and Physical Address.


Find MAC address in Windows 7
1. Click the Start menu,.
2. Then open the Control Panel
3. Then open Network and Sharing Center.
4. Click the link labeled View Status by the connection you want to examine.


5. Click the Details button.
6. A Network Connection Details dialog box appears.
7. Locate the item labeled Physical Address, which is the MAC Address number.


Find MAC address in MacOS X
1. Open 'System Preferences' (found in the dock)
2. Select 'Network'
3. Select 'Built-in Ethernet' from the 'Show' drop-down list.

4. Click on the 'Ethernet' tab
5. The 'Ethernet ID' is the MAC Address (in this case it is 00:0d:93:32:ee:f2)



For wireless,
1. Select 'Airport' in the Show: dialog.
2. Read the MAC address labeled 'Airport ID:'.




Find MAC address in Linux System

1. Start terminal.
2. Type in command #show arp

You will have entries in the form:
Address Hwtype Hwaddress Flags Mask Iface
172.16.0.69 ether 00:19:D1:3E:DD:9C C eth0

OR
1. Start terminal.
2. Type in command # ifconfig -a
HWaddress is also know as the MAC address

OR



Change Your MAC Address in Linux

For example, lets change the MAC address of your first netwrok card, usually called eth0.
Let’s swith to being the root user and view the current MAC address:-
ifconfig eth0

1. You should get something similiar:-
[root@rhel-5new ~]# ifconfig eth0
eth0 Link encap:Ethernet HWaddr 08:00:27:2C:D2:B5
inet addr:192.168.0.108 Bcast:192.168.0.255 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fe2c:d2b5/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:20545 errors:0 dropped:0 overruns:0 frame:0
TX packets:18348 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:10083277 (9.6 MiB) TX bytes:7489363 (7.1 MiB)
Interrupt:11 Base address:0xd020
The MAC address is listed next to the HWAddr column, which is 08:00:27:2C:D2:B5 in this case.
2. We’ll change it. First shutdown the network interface.
ifconfig eth0 down

3. Now change it to say, 08:00:27:2C:D2:B4.
ifconfig eth0 hw ether 00:00:27:2c:d2:b4

4. Bring the interface up.
ifconfig eth0 up

5. Finally, lets have a look at the new mac address.
[root@rhel-5new ~]# ifconfig eth0
eth0 Link encap:Ethernet HWaddr 00:00:27:2C:D2:B4
inet addr:192.168.0.108 Bcast:192.168.0.255 Mask:255.255.255.0
inet6 addr: fe80::200:27ff:fe2c:d2b4/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:20957 errors:0 dropped:0 overruns:0 frame:0
TX packets:18642 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:10146055 (9.6 MiB) TX bytes:7520724 (7.1 MiB)
Interrupt:11 Base address:0xd020


Find iPad’s MAC address
1. Start out by selecting Settings from your home screen


2. Select General from the list on the left side of the Settings window, and then About from the column on the right side.
3. Here you’ll find the MAC addresses for both the Wi-Fi and Bluetooth devices in your iPad


Find MAC address on iPhone

1. First, on your home screen, press on the Settings icon.

2. Next tap General option under Settings

3. After that, go ahead and tap the About option
4. Finally, scroll down until you see Wi-fi Address and Bluetooth. Those are the MAC addresses for both Wi-Fi and Bluetooth, in case you are using both.

Find MAC address on Windows Mobile 5.0


1 On your Start Menu, click on the settings menu

2 In the settings window enter, click on the connections tab.

3 On the connections tab click on the Wireless LAN icon.

4 On the Wireless LAN screen click on the 'Advanced' tab to display additional information.

5 From the information displayed, locate where it says 'MAC Address'. This is what you will need in order to register your device.


Find MAC address in Blackberry's
1. Open the Manage Connections app.
2. Make sure Mobile Network and Wi-Fi option is selected ticked
3. Select Set-Up Wi-Fi Network.

4. Select Next.
5. Select Scan For Networks.
6. Choose the network you wish to connect to.

7. Give the connection a name if desired. Select Next.
8. You’re done. Select Finish.
9. Find Media Access Control (MAC)
o At the home screen press Menu
o Then open Options.
o Select Status.
o The WLAN MAC field displays the MAC address for the BlackBerry smartphone.

General : How to connect an iPad to a Wireless or Wi-Fi network

12 comments
How to connect an iPad to a Wireless or Wi-Fi network

Table of Contents
  1. How to connect to a Wi-Fi or Wireless Network
  2. How to connect to a Wi-Fi or Wireless network that is not broadcasting its name or SSID
  3. How to configure your iPad Wi-Fi connection to use a static IP address
  4. How to configure your iPad to use a Proxy Server
  5. Deleting a Wi-Fi connection profile so the iPad wont automatically join it
  6. Troubleshooting
  7. Conclusion

How to connect to a Wi-Fi or Wireless Network
This section will explain how to connect to a Wi-Fi or Wireless network that is broadcasting its name or SSID. For most public, and many private, Wi-Fi networks the name, or SSID, of the network is broadcast so that anyone who tries to connect to it will be able to do so. This guide will walk you through the steps of connecting to a Wi-Fi network that is broadcasting its name. If you wish to connect to a wireless  that is not broadcasting its name, then please see the steps here.


  1. Start the iPad

  2. Tap on the Settings app. The Settings icon looks like the following:




    Settings Icon
    Settings Icon


    Once in the settings application, you will be at the General Settings screen as shown below.




    General Settings screen
    General Settings screen


  3. Tap on the Wi-Fi category to get to the screen where you will connect to a wireless network as shown below.




    Choose an available wireless network screen
    Choose an available wireless network screen

    When you reach this screen, the iPad will start searching for Wi-Fi networks that are in range and that are broadcasting their names. As it discovers available networks it will list them under the Choose a Network... label. Please note that it may take some time for the iPad to see all of the available networks, so please be patient while it searches. You can tell that it is searching as there will be an animated symbol next to the Choose a Network... label while it is searching. If it does not find anything, it will pause for about a minute and then attempt to search again.

    When you see the Wi-Fi network that you would like to connect to, simply tap on it to attempt to join it. If it has a lock next to the name, then it will require you to enter a wireless encryption password in order to connect to it as discussed in the next step.

  4. Once you Tap on a network name, it will try to connect to it. If the network is not using encryption, then you can just skip to this step. If the network is using wireless encryption, though, you will be presented with a screen asking you to enter the wireless encryption password as shown below.




    Enter wireless security password screen
    Enter wireless security password screen


    In the password field, enter the wireless encryption password that is required to join this network. This password was originally set on your wireless router, and if you do not remember this password anymore, you can logon to the router and change the password to a new one. Please note that if you change the password on the router, then any other devices that connect to this device wirelessly will also need to have their settings changed to use the new password.


  5. The iPad will now attempt to connect to the network, and when finished, will display the Wi-Fi settings screen again, but this time with the joined network listed and with a checkmark next to it as shown below.




    Screen showing the iPad connected to a wireless network
    Screen showing the iPad connected to a wireless network


    This checkmark designates that your iPad is connected to the network. You can also see that your iPad is connected to a wireless network as in the upper left-hand corner you will see the word iPad with the Wi-Fi symbol ()next to it. You can now go back to your home screen and use any apps that require Wi-Fi connectivity.

How to connect to a Wi-Fi or Wireless network that is not broadcasting its name or SSID
There are many networks that do not advertise their network name, or SSID, for extra security. Due to this, the only way for an iPad to connect to these types of networks is to manually enter the network information that is required to make a connection. This section will explain how to manually connect your iPad to a wireless network.
In order to accomplish this please follow these steps:


  1. Start the iPad

  2. Tap on the Settings app. The app icon looks like the following:




    Settings Icon
    Settings Icon


    Once in the settings application, you will be at the General Settings screen as shown below.




    General Settings screen
    General Settings screen



  3. Tap on the Wi-Fi category to get to the screen where you will connect to a wireless network as shown below.




    Wi-Fi Settings screen
    Wi-Fi Settings screen


  4. Determine the correct Name, or SSID, that you will be connecting to and Tap on the Other... button. You will now be at the Other Network screen where the iPad will ask you to enter the settings required to connect to the network.




    Enter SSID screen
    Enter SSID screen


    In the Name field, enter the network name or SSID.

  5. Then tap on the Security button and you will be at the screen show below.




    Select Security Encryption Type screen
    Select Security Encryption Type screen

    At this screen you need to select the wireless encryption that the network that network you wish to connect to is using. It is important that you select the correct encryption type, as if you do not, you will not be able to connect to the wireless network. After selecting the encryption type, tap on the Other Network button.

  6. You will now be back at the Other Network screen where the iPad is now prompting you to enter the password as shown below.





    Enter Security Encryption Password screen
    Enter Security Encryption Password screen

    In the password field, please enter the password that is required to connect to the Wi-Fi network. This password was originally set on your wireless router, and if you do not remember this password, you can logon to the router and change the password to a new one. Please note that if you change the password on the router, then any other devices that connect to this device wirelessly will also need to have their settings changed to use the new password.

  7. Once you have entered in all the required information, tap the Join button on the iPad keyboard. The iPad will attempt to connect to the network, and when finished, will display the Wi-Fi settings screen again, but this time with the joined network listed and with a checkmark next to it as shown below.




    Screen showing the iPad connected to a wireless network
    Screen showing the iPad connected to a wireless network


    This checkmark designates that your iPad is connected to the network. You can also see that your iPad is connected to a wireless network as in the upper left-hand corner you will see the word iPad with the Wi-Fi symbol () next to it. You can now go back to your home screen and use any apps that require Wi-Fi connectivity.

How to configure your iPad Wi-Fi connection to use a static IP address
If the wireless network you are connecting to does not use DHCP to assign IP addresses to wireless devices, then you will need to configure your iPad with static IP addresses and other information in order to connect to the Internet or a network. To do this first find out the info, such as the static IP address, IP subnet mask, DNS servers, and router IP address, and proceed with the following steps. Please note, you must first create the wireless profile that you will be assigning static information to.


  1. Start the iPad

  2. Tap on the Settings app. When the Settings app loads, you will be at the General Settings category.


  3. Tap on the Wi-Fi settings category and you will be at a screen as shown below.




    Screen showing the iPad connected to a wireless network
    Screen showing the iPad connected to a wireless network

    You should now tap on the to access the specific settings of the wireless connection.

  4. You will now be at the Wi-Fi network settings screen for the connected network.





    Wireless settings for a Wi-Fi network
    Wireless settings for a Wi-Fi network

  5. Now tap the Static button to enter the static settings screen as shown below.




    Screen showing the iPad connected to a wireless network
    Screen showing the iPad connected to a wireless network

    In this screen you can enter the IP address, IP subnet mask, router IP address, DNS server, and search domains as necessary. At a minimum you must enter information in the IP Address, Subnet Mask, Router, and DNS fields for the iPad to be able to properly work on the wireless network. If you do not know this information, you should ask the router owner or administrator.

    When you are done entering the information, tap on the Wi-Fi Networks button and then go back to your Home screen to start using the iPad with these new settings.

How to configure your iPad to use a Proxy Server
Some networks require you to use a proxy server to access the Internet. A proxy server is another computer or device that acts as an intermediary between you and the Internet by relaying your requests to a server and the servers responses back to you. Unfortunately, this type of setup requires you to specify certain settings in order for you to use the Internet properly. This section will provide information on how to configure your iPad to use a proxy server.


  1. Start the iPad

  2. Tap on the Settings app. When the Settings app loads, you will be at the General Settings category.


  3. Tap on the Wi-Fi settings category and you will be at a screen as shown below.




    Screen showing the iPad connected to a wireless network
    Screen showing the iPad connected to a wireless network

    You should now tap on the to access the specific settings of the wireless connection.

  4. You will now be at the Wi-Fi network settings screen for the connected network.





    Wireless settings for a Wi-Fi network
    Wireless settings for a Wi-Fi network


    At the bottom you will find three proxy server options that you can choose from. The first option is Off, which is the default option and means that the iPad will not use a Proxy Server. The second setting is Manual, which means that you will enter the specific information about proxy server in the specified fields. The last option is Auto, which allows you to enter a URL that contains the configuration information as to what proxy settings the iPad should use.

  5. If you need to specify manual settings, then simply tap on the Manual button and fill in the appropriate fields as shown below.




    Screen showing the iPad connected to a wireless network
    Screen showing the iPad connected to a wireless network

    If your proxy server requires you to login to it before it allows you to use it, make sure you slide Authentication to ON and input your login credentials.

    If you have a configuration URL that contains your proxy settings, then simply tap on the Auto button and you will see a screen similar to below.




    Screen showing the iPad connected to a wireless network
    Screen showing the iPad connected to a wireless network

    Simply fill in the URL field with the proxy autoconfiguration URL.

  6. When you are done setting up your proxy server, tap on the Wi-Fi Networks button and then go back to your Home screen to start using the iPad with these new settings.

Deleting a Wi-Fi connection profile so the iPad wont automatically join it
At times you may find the need to delete a Wi-Fi connection profile that has previously been configured on your iPad. Whether this is because the profile belongs to a hotel that you are no longer staying at or you have changed your wireless password and need to re-enter it, this section will explain how to delete the profile from your iPad.


  1. Start the iPad

  2. Tap on the Settings app. When the Settings app loads, you will be at the General Settings category.


  3. Tap on the Wi-Fi settings category and you will be at a screen as shown below.




    Screen showing the iPad connected to a wireless network
    Screen showing the iPad connected to a wireless network

    You should now tap on the next to the Wi-Fi profile that you wish to delete.

  4. You will now be at the Wi-Fi network settings screen for the connected network.





    Wireless settings for a Wi-Fi network
    Wireless settings for a Wi-Fi network

  5. Tap on the Forget this Network button.

  6. When the iPad asks you to confirm that you wish to forget the network, tap on the Forget button.
You will no longer automatically connect to this network. Do not be concerned, though, if you go back to the Wi-Fi settings and still see the network you just specified should be forgotten. Once you power off the iPad, and start it again, the network will no longer be listed.

Troubleshooting
When working with computers and networking problems invariably happen. This section will offer steps that can be tried to resolve Wi-Fi connectivity issues with your iPad.
What to do if your iPad can't access a visible network:
The first step is to make sure that the wireless connection does not require a password. You can determine this by seeing if there is a lock symbol next to the wireless network name. If there is, then make sure you know the correct password to the network before attempting to join it. If that still does not resolve your issue, try moving closer to the wireless router and seeing if you are able to connect then.
What to do if you cannot access a network that is not broadcasting its network name or SSID:
Diagnosing connections to Wi-Fi networks that are not broadcasting their name or SSID can be difficult. The first suggestion, if the wireless router is under your control, is to allow the router to broadcast the name. If you can then connect, then you may have entered the name incorrectly, selected the wrong wireless encryption type, or entered the wrong wireless encryption password. You should then confirm these settings by looking at the configuration of the router, and if necessary, changing those settings to new ones. Then try connecting again.
What to do if you cannot access the Internet when connected to a wireless network:
If it shows that you are connected to a network, but you still cannot access the network, you should first make sure that your Internet connection is actually working. Test the connection from another computer and device to confirm that it is working. If it is working, go into the Wi-Fi settings for this particular connection on the iPad and under the DHCP settings, make sure that you have an assigned IP Address, Subnet Mask, Router, and DNS. If you do not have these fields populated, then tap on the Renew Lease button, and then tap on the Renew button when it asks if you with to continue. This will make the iPad request new connection settings. Once that is done, if you now have settings in the DHCP fields, try connecting to the Internet again.
If this still does not work, then you may want to confirm that you do not need to enter a static networking configuration into the iPad. To determine this, you should ask the owner or administrator of the wireless router.
Last, but not least, if the iPad shows its connected, but cannot access the internet, it could be because you entered the wrong wireless encryption password or it was changed after you initially created the Wi-Fi profile. To test this, simply Forget the network profile and try recreating it and entering the password again.
How to fix slow iPad Wi-Fi speeds or low quality wireless connections:
Unfortunately there have been a lot of reports that the iPad wireless range and sensitivity is not as good as it could, or should, be. That means that Wi-Fi connections that work fine with other devices or computers may not work as well with the iPad. To determine the quality of your Wi-Fi connection, you can look in the upper left-hand corner of the device. The three quality levels are shown from best to worst as , with the lower the level being the worst connection speed.
Unless Apple releases an update, or a software hack is released to increase the power of the antenna, we will need to use other methods to make the Wi-Fi connection quality better. To do this you can first try and use the iPad closer to the wireless router to increase your connection quality. This, though, is a ridiculous thing to have to do considering how much you spent on the iPad. Another option is to purchase a wireless extender that can extend the range of your wireless device so it is strong throughout your entire house or apartment. Popular extenders are the Linksys WRE54G Wireless-G Extender, Belkin Wireless G Universal Range Extender, or the Netgear WGXB102 Range Extender. When you add an extender to your wireless network, it will increase the range of your wireless router so that you can connect to your network in locations that previously you could not.

Conclusion
As you can see there are many Wi-Fi configuration options available to suit your specific needs. By knowing how to connect to a wireless network you can now connect to the Internet from locations such as a public Wi-Fi hotspot, a friends house, or a hotel. No matter what the specific requirement of your location, hopefully the information in this guide has shown you how to work around them. If you have any questions with the information here,s or need some help with the steps, please do not hesitate to ask in our iPad forum.

Cited from : http://www.bleepingcomputer.com/tutorials/tutorial163.html