SlideShare a Scribd company logo
1 of 21
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1Version 4.0
Configure a Wireless
Router
LAN Switching and Wireless – Chapter 7
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Objectives
 Describe the components and operations of basic
wireless LAN topologies.
 Describe the components and operations of basic
wireless LAN security.
 Configure and verify basic wireless LAN access.
 Configure and troubleshoot wireless client access.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Explain the Components and Operations
of Basic Wireless LAN Topologies
 Describe why wireless LANs are a popular choice for
small business LAN implementations
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Explain the Components and Operations
of Basic Wireless LAN Topologies
 Describe the 802.11 wireless standards
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Explain the Components and Operations
of Basic Wireless LAN Topologies
 Describe the components of a 802.11-based wireless
infrastructure
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Explain the Components and Operations
of Basic Wireless LAN Topologies
 Describe how wireless networks operate
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Explain the Components and Operations
of Basic Wireless LAN Topologies
 Describe how to plan a wireless LAN
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Explain the Components and Operations
of Basic Wireless LAN Security
 Describe the threats to wireless LAN security
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Explain the Components and Operations
of Basic Wireless LAN Security
 Describe the wireless protocols. The description will
include a description of 802.1x, a comparison of WPA
and WPA2 as well as comparison of TKIP and AES
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Explain the Components and Operations
of Basic Wireless LAN Security
 Describe how to secure a wireless LAN from the key
security threats
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Configure and Verify Basic Wireless LAN
Access
 Configure a wireless access point
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Configure and Verify Basic Wireless LAN
Access
 Configure a wireless NIC
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Configure and Troubleshoot Wireless
Client Access
 Describe how to solve access point firmware issues
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Configure and Troubleshoot Wireless
Client Access
 Describe how to solve incorrect channel settings
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Configure and Troubleshoot Wireless
Client Access
 Describe how to solve common RF interference issues
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Configure and Troubleshoot Wireless
Client Access
 Describe how to correct antenna misplacement
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Configure and Troubleshoot Wireless
Client Access
 Describe how to solve the common problems
associated with wireless LAN encryption types
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Configure and Troubleshoot Wireless
Client Access
 Describe how to solve authentication problems
associated with wireless LANs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Summary
 Wireless LANs use standards such as
IEEE 802.11a
IEEE 802.11b
IEEE 802.11g
IEEE 802.11n
 Basic Service set
–Mobile clients use a single access point for connectivity
 Extended service set
–Multiple access point that share an SSID
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Summary
 WLAN security practices/methods include
–MAC address filtering
–SSID making
–Implementing WPA2
 Configuration of wireless NIC and access point
–Configure both of them the same way
•SSID
–Ensure that the latest firmware is installed
 Troubleshooting WLANs include doing the following:
–Check channel setting
–Check for interference
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21

More Related Content

What's hot

Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2
Carmelo de Jesús
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
Irsandi Hasan
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3
Carmelo de Jesús
 
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
Irsandi Hasan
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
Irsandi Hasan
 

What's hot (20)

CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
 
Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2
 
CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4CCNA Exploration 4 - Chapter 4
CCNA Exploration 4 - Chapter 4
 
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
 
CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
 
Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3Exploration Lan Switching Chapter3
Exploration Lan Switching Chapter3
 
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
 
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6
 
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link Aggregation
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 
Chapter 18 : routing dynamically
Chapter 18 : routing dynamicallyChapter 18 : routing dynamically
Chapter 18 : routing dynamically
 
CCNA4 Verson6 Chapter6
CCNA4 Verson6 Chapter6CCNA4 Verson6 Chapter6
CCNA4 Verson6 Chapter6
 

Viewers also liked

CCNA Discovery 3 - Chapter 7
CCNA Discovery 3 - Chapter 7CCNA Discovery 3 - Chapter 7
CCNA Discovery 3 - Chapter 7
Irsandi Hasan
 
CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7
Irsandi Hasan
 
CCNA Exploration 3 - Chapter 3
CCNA Exploration 3 - Chapter 3CCNA Exploration 3 - Chapter 3
CCNA Exploration 3 - Chapter 3
Irsandi Hasan
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
shah_ril1512
 
CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2
Irsandi Hasan
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
shah_ril1512
 

Viewers also liked (20)

Obtener contraseñas del directorio activo por hkm
Obtener contraseñas del directorio activo por hkmObtener contraseñas del directorio activo por hkm
Obtener contraseñas del directorio activo por hkm
 
Recuperacion de defaces con versionador Git por Alevsk
Recuperacion de defaces con versionador Git por Alevsk Recuperacion de defaces con versionador Git por Alevsk
Recuperacion de defaces con versionador Git por Alevsk
 
Seguridad en Bitcoin por Luis Daniel Beltran
Seguridad en Bitcoin por Luis Daniel BeltranSeguridad en Bitcoin por Luis Daniel Beltran
Seguridad en Bitcoin por Luis Daniel Beltran
 
OSINT vs CIBERCRIMEN por nickops
OSINT vs CIBERCRIMEN por nickopsOSINT vs CIBERCRIMEN por nickops
OSINT vs CIBERCRIMEN por nickops
 
CCNA Discovery 3 - Chapter 7
CCNA Discovery 3 - Chapter 7CCNA Discovery 3 - Chapter 7
CCNA Discovery 3 - Chapter 7
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
 
IPv6 ACL
IPv6 ACLIPv6 ACL
IPv6 ACL
 
CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7
 
CCNA Exploration 3 - Chapter 3
CCNA Exploration 3 - Chapter 3CCNA Exploration 3 - Chapter 3
CCNA Exploration 3 - Chapter 3
 
IPv6 DHCP
IPv6 DHCPIPv6 DHCP
IPv6 DHCP
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
Inovasi
InovasiInovasi
Inovasi
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 

Similar to CCNA Exploration 3 - Chapter 7

CCNA Discovery 1 - Chapter 7
CCNA Discovery 1 - Chapter 7CCNA Discovery 1 - Chapter 7
CCNA Discovery 1 - Chapter 7
Irsandi Hasan
 
Exploration lan switching_chapter7
Exploration lan switching_chapter7Exploration lan switching_chapter7
Exploration lan switching_chapter7
robertoxe
 
Exploration lan switching_chapter7
Exploration lan switching_chapter7Exploration lan switching_chapter7
Exploration lan switching_chapter7
robertoxe
 
Configuracion de un router wireless
Configuracion de un router wirelessConfiguracion de un router wireless
Configuracion de un router wireless
Alberto Jimenez
 
CCNA Discovery 3 - Chapter 9
CCNA Discovery 3 - Chapter 9CCNA Discovery 3 - Chapter 9
CCNA Discovery 3 - Chapter 9
Irsandi Hasan
 
Exploration lan switching_chapter3
Exploration lan switching_chapter3Exploration lan switching_chapter3
Exploration lan switching_chapter3
Jaime Cuevas
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
Irsandi Hasan
 
CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3
Irsandi Hasan
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
Irsandi Hasan
 
Chapter 5
Chapter 5 Chapter 5
Chapter 5
ali raza
 
CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5
Irsandi Hasan
 
Chapter 8
Chapter 8 Chapter 8
Chapter 8
ali raza
 
Week12 frame relay
Week12 frame relayWeek12 frame relay
Week12 frame relay
libra aziz
 
CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8
Irsandi Hasan
 

Similar to CCNA Exploration 3 - Chapter 7 (20)

CCNA Discovery 1 - Chapter 7
CCNA Discovery 1 - Chapter 7CCNA Discovery 1 - Chapter 7
CCNA Discovery 1 - Chapter 7
 
Exploration lan switching_chapter7
Exploration lan switching_chapter7Exploration lan switching_chapter7
Exploration lan switching_chapter7
 
Exploration lan switching_chapter7
Exploration lan switching_chapter7Exploration lan switching_chapter7
Exploration lan switching_chapter7
 
Configuracion de un router wireless
Configuracion de un router wirelessConfiguracion de un router wireless
Configuracion de un router wireless
 
CCNA Discovery 3 - Chapter 9
CCNA Discovery 3 - Chapter 9CCNA Discovery 3 - Chapter 9
CCNA Discovery 3 - Chapter 9
 
Exploration lan switching_chapter3
Exploration lan switching_chapter3Exploration lan switching_chapter3
Exploration lan switching_chapter3
 
vlan
vlanvlan
vlan
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cap7 wireless
Cap7   wirelessCap7   wireless
Cap7 wireless
 
Week2 2
Week2 2Week2 2
Week2 2
 
CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3CCNA Discovery 3 - Chapter 3
CCNA Discovery 3 - Chapter 3
 
CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1CCNA Discovery 4 - Chapter 1
CCNA Discovery 4 - Chapter 1
 
Chapter 5
Chapter 5 Chapter 5
Chapter 5
 
CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5
 
Week4(1)(1)
Week4(1)(1)Week4(1)(1)
Week4(1)(1)
 
Chapter 8
Chapter 8 Chapter 8
Chapter 8
 
Week12 frame relay
Week12 frame relayWeek12 frame relay
Week12 frame relay
 
CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8
 
Week3 1
Week3 1Week3 1
Week3 1
 

More from Irsandi Hasan

More from Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

CCNA Exploration 3 - Chapter 7

  • 1. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7
  • 2. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Objectives  Describe the components and operations of basic wireless LAN topologies.  Describe the components and operations of basic wireless LAN security.  Configure and verify basic wireless LAN access.  Configure and troubleshoot wireless client access.
  • 3. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Explain the Components and Operations of Basic Wireless LAN Topologies  Describe why wireless LANs are a popular choice for small business LAN implementations
  • 4. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4 Explain the Components and Operations of Basic Wireless LAN Topologies  Describe the 802.11 wireless standards
  • 5. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5 Explain the Components and Operations of Basic Wireless LAN Topologies  Describe the components of a 802.11-based wireless infrastructure
  • 6. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6 Explain the Components and Operations of Basic Wireless LAN Topologies  Describe how wireless networks operate
  • 7. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7 Explain the Components and Operations of Basic Wireless LAN Topologies  Describe how to plan a wireless LAN
  • 8. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8 Explain the Components and Operations of Basic Wireless LAN Security  Describe the threats to wireless LAN security
  • 9. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9 Explain the Components and Operations of Basic Wireless LAN Security  Describe the wireless protocols. The description will include a description of 802.1x, a comparison of WPA and WPA2 as well as comparison of TKIP and AES
  • 10. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10 Explain the Components and Operations of Basic Wireless LAN Security  Describe how to secure a wireless LAN from the key security threats
  • 11. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11 Configure and Verify Basic Wireless LAN Access  Configure a wireless access point
  • 12. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12 Configure and Verify Basic Wireless LAN Access  Configure a wireless NIC
  • 13. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13 Configure and Troubleshoot Wireless Client Access  Describe how to solve access point firmware issues
  • 14. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14 Configure and Troubleshoot Wireless Client Access  Describe how to solve incorrect channel settings
  • 15. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15 Configure and Troubleshoot Wireless Client Access  Describe how to solve common RF interference issues
  • 16. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16 Configure and Troubleshoot Wireless Client Access  Describe how to correct antenna misplacement
  • 17. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17 Configure and Troubleshoot Wireless Client Access  Describe how to solve the common problems associated with wireless LAN encryption types
  • 18. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18 Configure and Troubleshoot Wireless Client Access  Describe how to solve authentication problems associated with wireless LANs
  • 19. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19 Summary  Wireless LANs use standards such as IEEE 802.11a IEEE 802.11b IEEE 802.11g IEEE 802.11n  Basic Service set –Mobile clients use a single access point for connectivity  Extended service set –Multiple access point that share an SSID
  • 20. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20 Summary  WLAN security practices/methods include –MAC address filtering –SSID making –Implementing WPA2  Configuration of wireless NIC and access point –Configure both of them the same way •SSID –Ensure that the latest firmware is installed  Troubleshooting WLANs include doing the following: –Check channel setting –Check for interference
  • 21. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21