Ca Ex S3 C7 Basic Wireless Concepts And Configuration

  • 1,713 views
Uploaded on

 

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,713
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
134
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. CCNA – Semester 3 Chapter 7: Basic Wireless Concepts and Configuration CCNA Exploration 4.0
  • 2. Objectives • Describe the components and operations of basic wireless LAN topologies. • Describe the components and operations of basic wireless LAN security. • Configure and verify basic wireless LAN access. • Configure and troubleshoot wireless client access. 2
  • 3. The Wireless LAN 3
  • 4. Why Use Wireless? • Business networks today are evolving to support people who are on the move. • Mobility environment: where people can take their connection to the network along with them on the road. • There are many different infrastructures (wired LAN, service provider networks) that allow mobility like this to happen, but in a business environment, the most important is the WLAN. • People now expect to be connected at any time and place 4
  • 5. Wireless Technologies 5
  • 6. Wireless LAN 6
  • 7. Comparing a WLAN to a LAN • In an 802.3 Ethernet LAN, each client has a cable that connects the client NIC to a switch. The switch is the point where the client gains access to the network. • In a wireless LAN, each client uses a wireless adapter to gain access to the network through a wireless device such as a wireless router or access point. 7
  • 8. Wireless standards 8
  • 9. Wireless Infrastructure Components 9
  • 10. Configurable Parameters for Wireless Endpoints • Wireless mode • Wireless Network Name: SSID • Wireless Channel: 10
  • 11. 802.11 Topologies: Ad hoc Network 11
  • 12. 802.11 Topologies: Basic Service Sets 12
  • 13. 802.11 Topologies: Extended Service Sets 13
  • 14. Client and Access Point Association • Beacon 14
  • 15. Client and Access Point Association 15
  • 16. Client and Access Point Association Step 3 - 802.11 Association 16
  • 17. Planning the Wireless LAN 17
  • 18. Planning the Wireless LAN 18
  • 19. Planning the Wireless LAN 19
  • 20. Planning the Wireless LAN 20
  • 21. Wireless LAN Security 21
  • 22. Wireless LAN Security Threats Unauthorized Access 22
  • 23. Wireless LAN Security Threats 23
  • 24. Wireless LAN Security Threats  Denial of Service 24
  • 25. Wireless Security Protocols 25
  • 26. Wireless Security Protocols 26
  • 27. Wireless Security Protocols 27
  • 28. Wireless Security Protocols • Encryption 28
  • 29. Securing a Wireless LAN 29
  • 30. Configure Wireless LAN Access 30
  • 31. Configuring the Wireless Access Point 31
  • 32. Setup: Basic Setup 32
  • 33. Administration: Management 33
  • 34. Configuring Basic Wireless Settings 34
  • 35. Security Mode • Select the mode you want to use: PSK-Personal, PSK2- Personal, PSK-Enterprise, PSK2-Enterprise, RADIUS, or WEP. 35
  • 36. Mode Parameters • Enterprise modes are not configured in this chapter 36
  • 37. Configure Encryption and Key 37
  • 38. Configure a wireless NIC: Scan SSID 38
  • 39. Configure a wireless NIC: Scan SSID 39
  • 40. Select the Wireless Security Protocol • Practice: 7.3.2.4 40
  • 41. Troubleshooting Simple WLAN Problems 41
  • 42. Systematic Approach to WLAN Troubleshooting • Step 1 - Eliminate the client device as the source of the problem. • Step 2 - Confirm the physical status of WLAN devices. • Step 3 - Inspect wired links. 42
  • 43. Updating the Access Point Firmware 43
  • 44. Incorrect Channel Settings 44
  • 45. Incorrect Channel Settings: Solution 45
  • 46. Solving RF Interference 46
  • 47. Solving RF Interference • Site Surveys 47
  • 48. Site Survey • Two categories: Manual and utility assisted. • Manual site surveys can include a site evaluation to be followed by a more thorough utility-assisted site survey. A site evaluation involves inspecting the area with the goal of identifying potential issues that could impact the network. Specifically, look for the presence of multiple WLANs, unique building structures, such as open floors and atriums, and high client usage variances, such as those caused by differences in day or night shift staffing levels. • Note: you do not conduct site surveys as part of this course 48
  • 49. Access Point Misplacement 49
  • 50. Access Point Misplacement: Solution 50
  • 51. Access Point Misplacement: Solution • Ensure that access points are not mounted closer than 7.9 inches (20 cm) from the body of all persons. • Do not mount the access point within 3 feet (91.4 cm) of metal obstructions. • Install the access point away from microwave ovens. Microwave ovens operate on the same frequency as the access point and can cause signal interference. • Always mount the access point vertically (standing up or hanging down). • Do not mount the access point outside of buildings. • Do not mount the access point on building perimeter walls, unless outside coverage is desired. • When mounting an access point in the corner of a right-angle hallway intersection, mount it at a 45-degree angle to the two hallways. The access point internal antennas are not omnidirectional and cover a larger area when mounted this way. 51
  • 52. Problems with Authentication and Encrytion 52
  • 53. Problems with Authentication and Encrytion 53
  • 54. Problems with Authentication and Encrytion 54
  • 55. Summary 55
  • 56. 56