Ca Ex S3 C7 Basic Wireless Concepts And Configuration

Post on 13-Jan-2015

1.723 views 3 download

Tags:

description

 

Transcript of Ca Ex S3 C7 Basic Wireless Concepts And Configuration

CCNA – Semester 3

Chapter 7: Basic Wireless

Concepts and Configuration

CCNA Exploration 4.0

2

Objectives

• Describe the components and operations of basic

wireless LAN topologies.

• Describe the components and operations of basic

wireless LAN security.

• Configure and verify basic wireless LAN access.

• Configure and troubleshoot wireless client access.

3

The Wireless LAN

4

Why Use Wireless?

• Business networks today are evolving to support people who

are on the move.

• Mobility environment: where people can take their

connection to the network along with them on the road.

• There are many different infrastructures (wired LAN, service

provider networks) that allow mobility like this to happen, but

in a business environment, the most important is the WLAN.

• People now expect to be connected at any time and place

5

Wireless Technologies

6

Wireless LAN

7

Comparing a WLAN to a LAN

• In an 802.3 Ethernet LAN, each client has

a cable that connects the client NIC to a

switch. The switch is the point where the

client gains access to the network.

• In a wireless LAN, each client uses a

wireless adapter to gain access to the

network through a wireless device such as

a wireless router or access point.

8

Wireless standards

9

Wireless Infrastructure Components

10

Configurable Parameters for Wireless

Endpoints

• Wireless mode

• Wireless Network Name: SSID

• Wireless Channel:

11

802.11 Topologies: Ad hoc Network

12

802.11 Topologies: Basic Service Sets

13

802.11 Topologies: Extended Service

Sets

14

Client and Access Point Association

• Beacon

15

Client and Access Point Association

16

Client and Access Point Association

Step 3 - 802.11 Association

17

Planning the Wireless LAN

18

Planning the Wireless LAN

19

Planning the Wireless LAN

20

Planning the Wireless LAN

21

Wireless LAN Security

22

Wireless LAN Security Threats

Unauthorized Access

23

Wireless LAN Security Threats

24

Wireless LAN Security Threats

Denial of Service

25

Wireless Security Protocols

26

Wireless Security Protocols

27

Wireless Security Protocols

28

Wireless Security Protocols

• Encryption

29

Securing a Wireless LAN

30

Configure Wireless LAN Access

31

Configuring the Wireless Access Point

32

Setup: Basic Setup

33

Administration: Management

34

Configuring Basic Wireless Settings

35

Security Mode

• Select the mode you want to use: PSK-Personal, PSK2-

Personal, PSK-Enterprise, PSK2-Enterprise, RADIUS, or

WEP.

36

Mode Parameters

• Enterprise modes are not configured in this chapter

37

Configure Encryption and Key

38

Configure a wireless NIC: Scan SSID

39

Configure a wireless NIC: Scan SSID

40

Select the Wireless Security Protocol

• Practice: 7.3.2.4

41

Troubleshooting

Simple WLAN Problems

42

Systematic Approach to WLAN

Troubleshooting

• Step 1 - Eliminate the client device as the source of the

problem.

• Step 2 - Confirm the physical status of WLAN devices.

• Step 3 - Inspect wired links.

43

Updating the Access Point Firmware

44

Incorrect Channel Settings

45

Incorrect Channel Settings: Solution

46

Solving RF Interference

47

Solving RF Interference

• Site Surveys

48

Site Survey

• Two categories: Manual and utility assisted.

• Manual site surveys can include a site evaluation to be

followed by a more thorough utility-assisted site survey. A

site evaluation involves inspecting the area with the goal of

identifying potential issues that could impact the network.

Specifically, look for the presence of multiple WLANs,

unique building structures, such as open floors and

atriums, and high client usage variances, such as those

caused by differences in day or night shift staffing levels.

• Note: you do not conduct site surveys as part of this course

49

Access Point Misplacement

50

Access Point Misplacement: Solution

51

Access Point Misplacement: Solution

• Ensure that access points are not mounted closer than 7.9 inches (20

cm) from the body of all persons.

• Do not mount the access point within 3 feet (91.4 cm) of metal

obstructions.

• Install the access point away from microwave ovens. Microwave ovens

operate on the same frequency as the access point and can cause

signal interference.

• Always mount the access point vertically (standing up or hanging

down).

• Do not mount the access point outside of buildings.

• Do not mount the access point on building perimeter walls, unless

outside coverage is desired.

• When mounting an access point in the corner of a right-angle hallway

intersection, mount it at a 45-degree angle to the two hallways. The

access point internal antennas are not omnidirectional and cover a

larger area when mounted this way.

52

Problems with Authentication and Encrytion

53

Problems with Authentication and Encrytion

54

Problems with Authentication and Encrytion

55

Summary

56