Tutorial About Wireless cisco modul ke 5

download Tutorial About Wireless cisco modul ke 5

of 33

Transcript of Tutorial About Wireless cisco modul ke 5

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    1/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1

    Cisco Confidential 2011 Cisco and/or its affiliates. All rights reserved. 1

    Module 5:Wireless

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    2/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

    Jaringan tanpa kabel sebenarnya tidak sesulit sistem cable networkbahkan lebih mudah. Sistem jaringan WIFI atau Wireless tidakmemerlukan penghubung cable network antar computer.

    Keuntungan dari sistem WIFI , pemakai tidak dibatasi ruang gerak

    dan hanya dibatasi pada jarang jangkauan dari satu titik pemancarWIFI. Untuk jarak pada sistem WIFI mampu menjangkau area100feet atau 30M radius. Selain itu dapat diperkuat denganperangkat khusus seperti booster yang berfungsi sebagai relayyang mampu menjangkau ratusan bahkan beberapa kilometer ke

    satu arah (directional).

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    3/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    4/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    5/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    6/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

    Adhoc

    Adhoc adalah sistem peer to peer, dalam arti satu computerdihubungkan ke 1 computer dengan saling mengenal SSID. Jaditerdapat 2 computer dengan perangkat WIFI dapat langsungberhubungan tanpa alat yang disebut access point mode.

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    7/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

    Berbasis Infrastruktur / BSS (Basic set Service)Sistem Infra Structure membutuhkan sebuah perangkat khusus atau dapatdifungsikan sebagai Access point Mirip seperti Hub. Access Point inilahyang memberikan tanda apakah disuatu tempat memiliki jaringan WIFI dansecara terus menerus mentransmisikan namanya - Service Set IDentifier(SSID) dan dapat diterima oleh computer lain untuk dikenal.

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    8/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

    Berbasis Infrastruktur / ESS (Extended set Service)

    Sistem Infra Structure membutuhkan lebih dari sebuah perangkat khususatau dapat difungsikan sebagai Access point Mirip seperti Hub. AccessPoint inilah yang memberikan tanda apakah disuatu tempat memilikijaringan WIFI dan secara terus menerus mentransmisikan namanya -Service Set IDentifier (SSID) dan dapat diterima oleh computer lain untuk

    dikenal.

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    9/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    10/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    11/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    12/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    13/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

    Wireless LAN security issues

    The progession of WLAN security standard:

    Wired Equivalent PrivacyWEP

    SSID cloaking and MAC Filtering

    The Cisco interim solution between WEP and 802.11i

    Wi-Fi Protected AccessWPA

    IEEE 802.11i and WPA-2

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    14/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

    WLAN vulnerabilities and solutions

    Vulnerability Solution

    War drivers Strong authentication

    Hackers stealing information in aWLAN Strong encryption

    Hackers again access to the rest ofthe network

    Strong authentication

    Employee AP installation IDS, including Cisco SWAN

    Rogue AP Strong authentication, IDS/SWAN

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    15/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

    WEP

    Basicencryption

    No strongauthentication

    Static,breakable keys

    Not scalable

    MAC filters andSSID-cloakingalso used tocomplementWEP

    1997 2001

    802.1x EAP

    Dynamic keys

    Improvedencryption

    Userauthentication

    802.1X EAP(LEAP, PEAP)

    RADIUS

    2003

    WPA

    Standardized

    Improvedencryption

    Strong, userauthentication(such as, LEAP,PEAP, EAP-FAST)

    2004 to Present

    802.11i / WPA2

    AES strongencryption

    Authentication

    Dynamic keymanagement

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    16/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16Cisco Confidential 2011 Cisco and/or its affiliates. All rights reserved. 16

    Module 5:IPv6

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    17/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

    Internet Users or PC

    ~530 million users in Q2 CY2002, ~945 million by 2004(Source: Computer Industry Almanac)

    Emerging population/geopolitical and Address space

    PDA, Pen-Tablet, Notepad,

    ~20 millions in 2004 Mobile phones

    Already 1 billion mobile phones delivered by the industry

    Transportation

    1 billion automobiles forecast for 2008

    Internet access in Planes

    Consumer devices

    Billions of Home and Industrial Appliances

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    18/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    19/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    20/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    21/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    22/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

    Global Route Aggregation for Efficient Routing

    Conventions for Representing IPv6 Addresses

    Convention for Writing IPv6 Prefixes Global Unicast Prefix Assignment Example

    Subnetting Global Unicast IPv6 AddressesInside an Enterprise

    Prefix Terminology

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    23/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    24/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    25/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

    IPv6 prefixes represent a range or block of consecutive IPv6

    addresses, the number that represent the range of addresses,called a Prefix

    IPv6 classless and classfull addressing, and IPv6 addressing

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    26/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    27/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    28/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    29/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

    IPv6 Address format with interface ID and EUI-64

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    30/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30

    IPv4/IPv6 Dual StacksThe term dual stack means that the host or routeruses both IPv4 and IPv6 at the same time. The dualstack approach can be a reasonable plan of attack to

    migrate an enterprise to IPv6 for communicationinside the enterprise

    Tunneling

    Another tool to support the IPv4-to-IPv6 transition isTunneling

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    31/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

    Example IPv6-to-IPv4 tunnel, Physical and Logical View

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    32/33

    2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32

  • 8/13/2019 Tutorial About Wireless cisco modul ke 5

    33/33

    Thank you.