Вы находитесь на странице: 1из 75

Chapter 7: Basic Wireless Concepts and C fi C t d Configuration ti

CCNA Exploration 4.0

Objectives

Describe the components and operations of basic wireless LAN topologies topologies. Describe the components and operations of basic y wireless LAN security. Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.

Hc vin mng Bach Khoa - Website: www.bkacad.com

The Wireless LAN

Hc vin mng Bach Khoa - Website: www.bkacad.com

Why Use Wireless?



Business networks today are evolving to support people who are on the move. Mobility environment: where people can take their connection to the network along with them on the road. There are many different infrastructures (wired LAN LAN, service provider networks) that allow mobility like this to happen, but in a business environment, the most important is the WLAN. People now expect to be connected at any time and place

Hc vin mng Bach Khoa - Website: www.bkacad.com

Wireless Technologies

Hc vin mng Bach Khoa - Website: www.bkacad.com

Wireless Will Be Everywhere


WAN
(Wide Area Network)

MAN
(Metropolitan Area Network)

LAN
(Local Area Network)

PAN
(Personal Area Network) N t k)

Hc vin mng Bach Khoa - Website: www.bkacad.com

Wireless LAN

Hc vin mng Bach Khoa - Website: www.bkacad.com

Comparing a WLAN to a LAN

In an 802 3 Ethernet LAN each client has 802.3 LAN, a cable that connects the client NIC to a switch. The switch is the point where the client gains access to the network. g In a wireless LAN, each client uses a wireless adapter to gain access to the network through a wireless device such as g a wireless router or access point.
Hc vin mng Bach Khoa - Website: www.bkacad.com 8

What is WLAN RF Technology?

Hc vin mng Bach Khoa - Website: www.bkacad.com

Modulation

Hc vin mng Bach Khoa - Website: www.bkacad.com

10

802.11b Radio Modulation

Hc vin mng Bach Khoa - Website: www.bkacad.com

11

802.11b Direct Sequence Modulation

Hc vin mng Bach Khoa - Website: www.bkacad.com

12

2.4-GHz Channel Sets

Hc vin mng Bach Khoa - Website: www.bkacad.com

13

802.11b Access Point Coverage

Hc vin mng Bach Khoa - Website: www.bkacad.com

14

802.11b Scalability

Hc vin mng Bach Khoa - Website: www.bkacad.com

15

Comparing the Technologies 802.11a Data Rates

Hc vin mng Bach Khoa - Website: www.bkacad.com

16

802.11a Uses OFDM Modulation

Hc vin mng Bach Khoa - Website: www.bkacad.com

17

802.11a 5-GHz Frequency Bands

Hc vin mng Bach Khoa - Website: www.bkacad.com

18

802.11a Access Point Coverage

Hc vin mng Bach Khoa - Website: www.bkacad.com

19

802.11a Scalability (Indoor UNII-1 and UNII-2)

Hc vin mng Bach Khoa - Website: www.bkacad.com

20

Wireless standards

Hc vin mng Bach Khoa - Website: www.bkacad.com

21

Wireless Infrastructure Components

Hc vin mng Bach Khoa - Website: www.bkacad.com

22

Configurable Parameters for Wireless Endpoints

Wireless mode Wireless Network Name: SSID Wireless Channel:

Hc vin mng Bach Khoa - Website: www.bkacad.com

23

802.11 Topologies: Ad hoc Network

Hc vin mng Bach Khoa - Website: www.bkacad.com

24

802.11 Topologies: Basic Service Sets

Hc vin mng Bach Khoa - Website: www.bkacad.com

25

802.11 Topologies: Extended Service Sets

Hc vin mng Bach Khoa - Website: www.bkacad.com

26

802.11 Frame Format

Hc vin mng Bach Khoa - Website: www.bkacad.com

27

802.11 Frames Type



There are three types of MAC frames, namely: Control Frame: RTS CTS, ACK RTS, CTS Data Frame Management Frame: B Beacon Probe Req, Probe Resp Assoc Req, Assoc Resp R Reassoc Req, Reassoc R R R Resp Disassociation Authentication Deauthentication

Hc vin mng Bach Khoa - Website: www.bkacad.com

28

802.11 Frames Type (cont)

Hc vin mng Bach Khoa - Website: www.bkacad.com

29

Client and Access Point Association

Beacon

Hc vin mng Bach Khoa - Website: www.bkacad.com

30

Client and Access Point Association

Hc vin mng Bach Khoa - Website: www.bkacad.com

31

Client and Access Point Association


Step 3 - 802.11 Association

Hc vin mng Bach Khoa - Website: www.bkacad.com

32

Planning the Wireless LAN

Hc vin mng Bach Khoa - Website: www.bkacad.com

33

Planning the Wireless LAN

Hc vin mng Bach Khoa - Website: www.bkacad.com

34

Planning the Wireless LAN

Hc vin mng Bach Khoa - Website: www.bkacad.com

35

Planning the Wireless LAN

Hc vin mng Bach Khoa - Website: www.bkacad.com

36

Wireless LAN Security y

Hc vin mng Bach Khoa - Website: www.bkacad.com

37

Wireless LAN Security Threats


Unauthorized Access

Hc vin mng Bach Khoa - Website: www.bkacad.com

38

Wireless LAN Security Threats

Hc vin mng Bach Khoa - Website: www.bkacad.com

39

Wireless LAN Security Threats

Denial of Service

Hc vin mng Bach Khoa - Website: www.bkacad.com

40

Wireless Security Protocols

Hc vin mng Bach Khoa - Website: www.bkacad.com

41

Authentication and Encryption

Hc vin mng Bach Khoa - Website: www.bkacad.com

42

802.11 Open Authentication

Hc vin mng Bach Khoa - Website: www.bkacad.com

43

802.11 Shared Key Authentication

Hc vin mng Bach Khoa - Website: www.bkacad.com

44

Wireless Security Protocols

Hc vin mng Bach Khoa - Website: www.bkacad.com

45

Wireless Security Protocols

Hc vin mng Bach Khoa - Website: www.bkacad.com

46

Wireless Security Protocols

Encryption

Hc vin mng Bach Khoa - Website: www.bkacad.com

47

Securing a Wireless LAN

Hc vin mng Bach Khoa - Website: www.bkacad.com

48

Configure Wireless LAN Access g

Hc vin mng Bach Khoa - Website: www.bkacad.com

49

Configuring the Wireless Access Point

Hc vin mng Bach Khoa - Website: www.bkacad.com

50

Setup: Basic Setup

Hc vin mng Bach Khoa - Website: www.bkacad.com

51

Administration: Management

Hc vin mng Bach Khoa - Website: www.bkacad.com

52

Configuring Basic Wireless Settings

Hc vin mng Bach Khoa - Website: www.bkacad.com

53

Security Mode

Select the mode you want to use: PSK-Personal, PSK2Personal, PSK-Enterprise, PSK2-Enterprise, RADIUS, or WEP.
Hc vin mng Bach Khoa - Website: www.bkacad.com 54

Mode Parameters

Enterprise modes are not configured in this chapter


Hc vin mng Bach Khoa - Website: www.bkacad.com 55

Configure Encryption and Key

Hc vin mng Bach Khoa - Website: www.bkacad.com

56

Configure a wireless NIC: Scan SSID

Hc vin mng Bach Khoa - Website: www.bkacad.com

57

Configure a wireless NIC: Scan SSID

Hc vin mng Bach Khoa - Website: www.bkacad.com

58

Select the Wireless Security Protocol

Practice: 7.3.2.4
Hc vin mng Bach Khoa - Website: www.bkacad.com 59

Troubleshooting g Simple WLAN Problems

Hc vin mng Bach Khoa - Website: www.bkacad.com

60

Systematic Approach to WLAN Troubleshooting

Step St 1 - Eli i t th client d i as th source of th Eliminate the li t device the f the problem. Step 2 - Confirm the physical status of WLAN devices. p p y Step 3 - Inspect wired links.
Hc vin mng Bach Khoa - Website: www.bkacad.com 61

Updating the Access Point Firmware

Hc vin mng Bach Khoa - Website: www.bkacad.com

62

Incorrect Channel Settings

Hc vin mng Bach Khoa - Website: www.bkacad.com

63

Incorrect Channel Settings: Solution

Hc vin mng Bach Khoa - Website: www.bkacad.com

64

Solving RF Interference

Hc vin mng Bach Khoa - Website: www.bkacad.com

65

Solving RF Interference

Site Surveys

Hc vin mng Bach Khoa - Website: www.bkacad.com

66

Site Survey

Two categories: Manual and utility assisted. Manual site surveys can include a site evaluation to be y followed by a more thorough utility-assisted site survey. A site evaluation involves inspecting the area with the goal of identifying potential issues that could impact the network network. Specifically, look for the presence of multiple WLANs, unique building structures, such as open floors and atriums, and hi h client usage variances, such as th ti d high li t i h those caused by differences in day or night shift staffing levels.

Note: you do not conduct site surveys as part of this course


Hc vin mng Bach Khoa - Website: www.bkacad.com 67

Access Point Misplacement

Hc vin mng Bach Khoa - Website: www.bkacad.com

68

Access Point Misplacement: Solution

Hc vin mng Bach Khoa - Website: www.bkacad.com

69

Access Point Misplacement: Solution



Ensure that access points are not mounted closer than 7.9 inches (20 cm) from the body of all persons. Do t D not mount the access point within 3 f t (91 4 cm) of metal t th i t ithi feet (91.4 ) f t l obstructions. Install the access point away from microwave ovens. Microwave ovens operate on the same frequency as the access point and can cause t th f th i t d signal interference. Always mount the access point vertically (standing up or hanging down). d ) Do not mount the access point outside of buildings. Do not mount the access point on building perimeter walls, unless outside coverage is desired. When mounting an access point in the corner of a right-angle hallway intersection, mount it at a 45-degree angle to the two hallways. The access point internal antennas are not omnidirectional and cover a larger area when mounted this way.
Hc vin mng Bach Khoa - Website: www.bkacad.com 70

Problems with Authentication and Encrytion

Hc vin mng Bach Khoa - Website: www.bkacad.com

71

Problems with Authentication and Encrytion

Hc vin mng Bach Khoa - Website: www.bkacad.com

72

Problems with Authentication and Encrytion

Hc vin mng Bach Khoa - Website: www.bkacad.com

73

Summary

Hc vin mng Bach Khoa - Website: www.bkacad.com

74

Hc vin mng Bach Khoa - Website: www.bkacad.com

75

Вам также может понравиться