0
CCNA – Semester 3




 Chapter 7: Basic Wireless
Concepts and Configuration
      CCNA Exploration 4.0
Objectives

  • Describe the components and operations of basic
      wireless LAN topologies.
  •   Describe the componen...
The Wireless LAN




                   3
Why Use Wireless?
• Business networks today are evolving to support people who
    are on the move.
•   Mobility environme...
Wireless Technologies




                        5
Wireless LAN




               6
Comparing a WLAN to a LAN




• In an 802.3 Ethernet LAN, each client has
    a cable that connects the client NIC to a
  ...
Wireless standards




                     8
Wireless Infrastructure Components




                                     9
Configurable Parameters for Wireless
Endpoints
• Wireless mode
• Wireless Network Name: SSID
• Wireless Channel:




     ...
802.11 Topologies: Ad hoc Network




                                    11
802.11 Topologies: Basic Service Sets




                                        12
802.11 Topologies: Extended Service
Sets




                                      13
Client and Access Point Association
• Beacon




                                      14
Client and Access Point Association




                                      15
Client and Access Point Association
Step 3 - 802.11 Association




                                      16
Planning the Wireless LAN




                            17
Planning the Wireless LAN




                            18
Planning the Wireless LAN




                            19
Planning the Wireless LAN




                            20
Wireless LAN Security




                        21
Wireless LAN Security Threats
 Unauthorized Access




                                22
Wireless LAN Security Threats




                                23
Wireless LAN Security Threats
                      Denial of Service




                                           24
Wireless Security Protocols




                              25
Wireless Security Protocols




                              26
Wireless Security Protocols




                              27
Wireless Security Protocols
• Encryption




                              28
Securing a Wireless LAN




                          29
Configure Wireless LAN Access




                                30
Configuring the Wireless Access Point




                                        31
Setup: Basic Setup




                     32
Administration: Management




                             33
Configuring Basic Wireless Settings




                                      34
Security Mode




• Select the mode you want to use: PSK-Personal, PSK2-
  Personal, PSK-Enterprise, PSK2-Enterprise, RADI...
Mode Parameters




•   Enterprise modes are not configured in this chapter
                                              ...
Configure Encryption and Key




                               37
Configure a wireless NIC: Scan SSID




                                      38
Configure a wireless NIC: Scan SSID




                                      39
Select the Wireless Security Protocol




• Practice: 7.3.2.4
                                        40
Troubleshooting
Simple WLAN Problems




                       41
Systematic Approach to WLAN
Troubleshooting




• Step 1 - Eliminate the client device as the source of the
    problem.
•...
Updating the Access Point Firmware




                                     43
Incorrect Channel Settings




                             44
Incorrect Channel Settings: Solution




                                       45
Solving RF Interference




                          46
Solving RF Interference
• Site Surveys




                          47
Site Survey
• Two categories: Manual and utility assisted.
• Manual site surveys can include a site evaluation to be
  fol...
Access Point Misplacement




                            49
Access Point Misplacement: Solution




                                      50
Access Point Misplacement: Solution
• Ensure that access points are not mounted closer than 7.9 inches (20
    cm) from th...
Problems with Authentication and Encrytion




                                             52
Problems with Authentication and Encrytion




                                             53
Problems with Authentication and Encrytion




                                             54
Summary




          55
56
Upcoming SlideShare
Loading in...5
×

Ca Ex S3 C7 Basic Wireless Concepts And Configuration

1,767

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,767
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
139
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Ca Ex S3 C7 Basic Wireless Concepts And Configuration"

  1. 1. CCNA – Semester 3 Chapter 7: Basic Wireless Concepts and Configuration CCNA Exploration 4.0
  2. 2. Objectives • Describe the components and operations of basic wireless LAN topologies. • Describe the components and operations of basic wireless LAN security. • Configure and verify basic wireless LAN access. • Configure and troubleshoot wireless client access. 2
  3. 3. The Wireless LAN 3
  4. 4. Why Use Wireless? • Business networks today are evolving to support people who are on the move. • Mobility environment: where people can take their connection to the network along with them on the road. • There are many different infrastructures (wired LAN, service provider networks) that allow mobility like this to happen, but in a business environment, the most important is the WLAN. • People now expect to be connected at any time and place 4
  5. 5. Wireless Technologies 5
  6. 6. Wireless LAN 6
  7. 7. Comparing a WLAN to a LAN • In an 802.3 Ethernet LAN, each client has a cable that connects the client NIC to a switch. The switch is the point where the client gains access to the network. • In a wireless LAN, each client uses a wireless adapter to gain access to the network through a wireless device such as a wireless router or access point. 7
  8. 8. Wireless standards 8
  9. 9. Wireless Infrastructure Components 9
  10. 10. Configurable Parameters for Wireless Endpoints • Wireless mode • Wireless Network Name: SSID • Wireless Channel: 10
  11. 11. 802.11 Topologies: Ad hoc Network 11
  12. 12. 802.11 Topologies: Basic Service Sets 12
  13. 13. 802.11 Topologies: Extended Service Sets 13
  14. 14. Client and Access Point Association • Beacon 14
  15. 15. Client and Access Point Association 15
  16. 16. Client and Access Point Association Step 3 - 802.11 Association 16
  17. 17. Planning the Wireless LAN 17
  18. 18. Planning the Wireless LAN 18
  19. 19. Planning the Wireless LAN 19
  20. 20. Planning the Wireless LAN 20
  21. 21. Wireless LAN Security 21
  22. 22. Wireless LAN Security Threats Unauthorized Access 22
  23. 23. Wireless LAN Security Threats 23
  24. 24. Wireless LAN Security Threats  Denial of Service 24
  25. 25. Wireless Security Protocols 25
  26. 26. Wireless Security Protocols 26
  27. 27. Wireless Security Protocols 27
  28. 28. Wireless Security Protocols • Encryption 28
  29. 29. Securing a Wireless LAN 29
  30. 30. Configure Wireless LAN Access 30
  31. 31. Configuring the Wireless Access Point 31
  32. 32. Setup: Basic Setup 32
  33. 33. Administration: Management 33
  34. 34. Configuring Basic Wireless Settings 34
  35. 35. Security Mode • Select the mode you want to use: PSK-Personal, PSK2- Personal, PSK-Enterprise, PSK2-Enterprise, RADIUS, or WEP. 35
  36. 36. Mode Parameters • Enterprise modes are not configured in this chapter 36
  37. 37. Configure Encryption and Key 37
  38. 38. Configure a wireless NIC: Scan SSID 38
  39. 39. Configure a wireless NIC: Scan SSID 39
  40. 40. Select the Wireless Security Protocol • Practice: 7.3.2.4 40
  41. 41. Troubleshooting Simple WLAN Problems 41
  42. 42. Systematic Approach to WLAN Troubleshooting • Step 1 - Eliminate the client device as the source of the problem. • Step 2 - Confirm the physical status of WLAN devices. • Step 3 - Inspect wired links. 42
  43. 43. Updating the Access Point Firmware 43
  44. 44. Incorrect Channel Settings 44
  45. 45. Incorrect Channel Settings: Solution 45
  46. 46. Solving RF Interference 46
  47. 47. Solving RF Interference • Site Surveys 47
  48. 48. Site Survey • Two categories: Manual and utility assisted. • Manual site surveys can include a site evaluation to be followed by a more thorough utility-assisted site survey. A site evaluation involves inspecting the area with the goal of identifying potential issues that could impact the network. Specifically, look for the presence of multiple WLANs, unique building structures, such as open floors and atriums, and high client usage variances, such as those caused by differences in day or night shift staffing levels. • Note: you do not conduct site surveys as part of this course 48
  49. 49. Access Point Misplacement 49
  50. 50. Access Point Misplacement: Solution 50
  51. 51. Access Point Misplacement: Solution • Ensure that access points are not mounted closer than 7.9 inches (20 cm) from the body of all persons. • Do not mount the access point within 3 feet (91.4 cm) of metal obstructions. • Install the access point away from microwave ovens. Microwave ovens operate on the same frequency as the access point and can cause signal interference. • Always mount the access point vertically (standing up or hanging down). • Do not mount the access point outside of buildings. • Do not mount the access point on building perimeter walls, unless outside coverage is desired. • When mounting an access point in the corner of a right-angle hallway intersection, mount it at a 45-degree angle to the two hallways. The access point internal antennas are not omnidirectional and cover a larger area when mounted this way. 51
  52. 52. Problems with Authentication and Encrytion 52
  53. 53. Problems with Authentication and Encrytion 53
  54. 54. Problems with Authentication and Encrytion 54
  55. 55. Summary 55
  56. 56. 56
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×