Sunteți pe pagina 1din 9

LAB REPORT Access Point configuration

VI SEMESTER Group Number: 2 Roll numbers: 11CO16-11CO31 Date of Submission: 07 Feb. 2014

INTRODUCTION In computer networking, a wireless access point (AP) is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself. Prior to wireless networks, setting up a computer network in a business, home or school often required running many cables through walls and ceilings in order to deliver network access to all of the network-enabled devices in the building. With the creation of the wireless Access Point (AP), network users are now able to add devices that access the network with few or no cables. An AP normally connects directly to a wired Ethernet connection and the AP then provides wireless connections using radio frequency links for other devices to utilize that wired connection. Most APs support the connection of multiple wireless devices to one wired connection. Difference between Router and Access Point A Router is a device that routes packets across networks. If data from one computer is trying to get to another computer that is not on the same logical network it must be 'routed' to that network.

An Access Point is a device that allows other devices to connect wirelessly. Its nothing more than an antenna. Access points can be purchased individually and plugged into a wired switch or router to grant users wireless connectivity to that device.

Security Wireless access has special security considerations. Many wired networks base the security on physical access control, trusting all the users on the local network, but if wireless access points are connected to the network, anybody within range of the AP (which typically extends farther than the intended area) can attach to the network. The most common solution is wireless traffic encryption. Modern access points come with built-in encryption. The first generation encryption scheme WEP proved easy to crack; the second and third generation schemes, WPA and WPA2, are considered secure if a strong enough password or passphrase is used. Some WAPs support hotspot style authentication using RADIUS and other authentication servers. Some people say the net benefits of open wifi without passwords outweigh the risks. Other people say that every wireless access point should be locked down with a password. Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Advanced, High-Performance Wireless Access for the Small Business Highlights Supports high-bandwidth applications with the 802.11n standard; backward compatible with 802.11b and devices Connects to Power over Ethernet devices, simplifying installation and eliminating the need for and cost of installing external power supplies Protects business information with enhanced security, including rogue access point detection, advanced encryption, and select access filters Simplifies installation and configuration with easy-to-use web interface. Features Draft 802.11n wireless networking delivers greater throughput and extended range, maximizing the number of wireless clients per access point for your small business Easy installation and configuration via a web interface

Adjustable and removable dipole antennas with multiple-input, multipleoutput (MIMO) 3x3 diversity. Gigabit Ethernet LAN interface. Supports PoE and external DC power. HTTP Redirect facilitates the display of a spl. IPv6 host support for managing the access point over IPv6 Multiple basic service set identifier (BSSID) support allows the creation of multiple secure wireless workgroups for users and guests. Service set identifier (SSID) to VLAN mapping maintains application security and quality across wireless and wired. WPS allows for simple and secure deployment of the wireless network. Logging via syslog, email, or local log. Wi-Fi Multimedia (WMM) wireless QoS support. Setting up Cisco WAP4410N Wireless-N Access Point
Step1 :

Getting started To configure the access point we initially have to change the default gateway of the system this can be done by following the below listed steps : 1. 2. 3. 4. 5. Open Control Panel. Open Network and Sharing Centre. Open network connections. Go to Ethernet properties. Click on Internet Protocol Version 4 (TCP/IPv4) and click properties

6. Change the default gateway to 192.168.1.245 (this is the default IP of the access point).

Step2:

Open a web browser. Type in the IP of the access point. This will redirect you to the login page . Type in admin as the username and password. This will take you to the admin interface where we can configure the access point.

Functionalities
Changing username and password of the Access-point

Basic setup of Access-point Changing the host name and the device name.

Setting up the time of the access point

Setting up network This can be done under the wireless>basic settings The name of the wireless network can be specified here. Note: A maimum of 4 networks can be created.

Banning or Allowing users

Under the Wireless>Connection_control tab, we can choose to ban or allow users. Select the network to configure There are two radio buttons : 1. Allow only the following MAC addresses to connect to the wireless network 2.Prevent following MAC addresses from connecting to the network By the selecting the first one and specifying MAC addresses of devices, only those users get access to the network By the selecting the second one, these devices with the specified MAC addresses will be banned from the network. Note: Upto 20 devices can be banned/allowed access.

Security settings of the network

This can be be specified under Wireless>security. Here we select a created network and the security mode can be selected (eg. Disabled, WPA2, etc.)

Bandwidth restriction

Go to Wireless>Advanced settings Here we can restrict the bandwidth of a network. Beside the network name, we specify the ultilizaton threshold. Making this 0% will disable any device from connecting to the network and making it 100% will make the network work at maximum efficiency .

CONCLUSION: The different functionalities of the access point were explored and implemented. Some of the notable ones are: Preventing a specific Device from accessing the access point. Restricting the bandwidth of the network. Changing the Admin password and Network password.

S-ar putea să vă placă și