Sunteți pe pagina 1din 23

Configure a Wireless Router

LAN Switching and Wireless Chapter 7

Objectives

Describe the components and operations of basic wireless LAN topologies.


Describe the components and operations of basic wireless LAN security. Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.

Explain the Components and Operations of Basic Wireless LAN Topologies


Describe why wireless LANs are a popular choice for small business LAN implementations

802.16 - Working Group on Broadband Wireless Access Standards 802.20 - Mobile Broadband Wireless Access (MBWA)
3

Explain the Components and Operations of Basic Wireless LAN Topologies


Describe the 802.11 wireless standards

5 GHz/2.4 GHz

2.4 GHz

Explain the Components and Operations of Basic Wireless LAN Topologies


Describe the components of a 802.11-based wireless infrastructure

Explain the Components and Operations of Basic Wireless LAN Topologies


Describe how wireless networks operate

Explain the Components and Operations of Basic Wireless LAN Topologies


Describe how to plan a wireless LAN

Explain the Components and Operations of Basic Wireless LAN Security


Describe the threats to wireless LAN security

Explain the Components and Operations of Basic Wireless LAN Security


Describe the wireless protocols. The description will include a description of 802.1x, a comparison of WPA and WPA2 as well as comparison of TKIP and AES

RADIUS (Remote Authentication Dial In User Service) 9

WEP different flavors


Originally (1999) 64 bit:
Legal limits 24 bit Initialization Vector (IV) 40 bit key

128 bit:
104 bit (26 Hex-Characters) key

256 bit:
232 bit key Available, but not common

10

WEP how it works


Encrypt all network packages using
a stream-cipher (RC4) for confidentiality a checksum (CRC) for integrity

Evolution of WEP to WEP128 to WEP256:


Initialization Vector remains at 24 bit Encryption key size increases

Weekness in WEP
Key management and key size
Key management is not specified in the WEP standard; The ICV algorithm is not appropriate ICV is based on CRC-32, an algorithm for detecting noise and common errors in transmission

11

Explain the Components and Operations of Basic Wireless LAN Security


WPA provides additional security by:
Alternative to WEP introduced by the Wi-Fi Alliance in Oct 2003 Replaces RC4 with more robust TKIP (Temporal Key Integrity Protocol) and MIC (Message Integrity check) Provides mutual authentication and user authentication based on 802.1X/ EAP (Extensible Authentication Protocol) or Pre Shared Keys (PSK) Implementing a frame counter to discourage replay attacks

WPA2
WPA2TM was introduced by the Wi-Fi Alliance in Sep 2004 Equivalent to the IEEE 802.11i security standard ratified earlier in June 2004 Uses the powerful AES (Advanced Encryption Standard) for encryption. Provides mutual authentication and user authentication based on 802.1X/ EAP or Pre-Shared Keys similar to WPA

12

Explain the Components and Operations of Basic Wireless LAN Security


Describe how to secure a wireless LAN from the key security threats

13

Configure and Verify Basic Wireless LAN Access


Configure a wireless access point

14

Configure and Verify Basic Wireless LAN Access


Configure a wireless NIC

15

Configure and Troubleshoot Wireless Client Access


Describe how to solve access point firmware issues

16

Configure and Troubleshoot Wireless Client Access


Describe how to solve incorrect channel settings

17

Configure and Troubleshoot Wireless Client Access


Describe how to solve common RF interference issues

18

Configure and Troubleshoot Wireless Client Access


Describe how to correct antenna misplacement

19

Configure and Troubleshoot Wireless Client Access


Describe how to solve authentication problems associated with wireless LANs

20

802.11n

Cisco Aironet 1250 Series Access Point Up to 600 Mbps

AX411 Wireless LAN Access Point - Up to 300 Mbps

21

Summary
Wireless LANs use standards such as
IEEE 802.11a IEEE 802.11b IEEE 802.11g

IEEE 802.11n

Basic Service set


Mobile clients use a single access point for connectivity

Extended service set


Multiple access point that share an SSID

22

Summary
WLAN security practices/methods include
MAC address filtering SSID making Implementing WPA2

Configuration of wireless NIC and access point


Configure both of them the same way SSID Ensure that the latest firmware is installed

Troubleshooting WLANs include doing the following:


Check channel setting Check for interference

23

S-ar putea să vă placă și