Exploration lan switching_chapter7

643 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
643
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
43
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Graphic 7.1.1.2
  • Graphic 7.1.2.1
  • Graphics 7.1.3.1 & 7.1.3.3
  • Graphic 7.1.4.2
  • Graphic 7.1.5.1
  • Graphics 7.2.1.2, 7.2.1.1, 7.2.1.3
  • Graphic 7.2.2.1 If space permits use the following graphic 7.2.2.2 & 7.2.2.3
  • Graphic 7.2.3.1
  • Graphics 7.3.1.1 thru 7.3.1.3 (if you can’t do all of them then just do the first one from each page)
  • Graphics 7.3.2.2
  • Graphic 7.4.1.1 & 7.4.1.2
  • Graphic 7.4.2.1
  • Graphic 7.4.3.1
  • Graphic 7.4.4.1
  • Graphic 7.4.4.1
  • Graphic 7.4.5.1
  • Exploration lan switching_chapter7

    1. 1. Configure a Wireless Router LAN Switching and Wireless – Chapter 7
    2. 2. Objectives <ul><li>Describe the components and operations of basic wireless LAN topologies. </li></ul><ul><li>Describe the components and operations of basic wireless LAN security. </li></ul><ul><li>Configure and verify basic wireless LAN access. </li></ul><ul><li>Configure and troubleshoot wireless client access. </li></ul>
    3. 3. Explain the Components and Operations of Basic Wireless LAN Topologies <ul><li>Describe why wireless LANs are a popular choice for small business LAN implementations </li></ul>
    4. 4. Explain the Components and Operations of Basic Wireless LAN Topologies <ul><li>Describe the 802.11 wireless standards </li></ul>
    5. 5. Explain the Components and Operations of Basic Wireless LAN Topologies <ul><li>Describe the components of a 802.11-based wireless infrastructure </li></ul>
    6. 6. Explain the Components and Operations of Basic Wireless LAN Topologies <ul><li>Describe how wireless networks operate </li></ul>
    7. 7. Explain the Components and Operations of Basic Wireless LAN Topologies <ul><li>Describe how to plan a wireless LAN </li></ul>
    8. 8. Explain the Components and Operations of Basic Wireless LAN Security <ul><li>Describe the threats to wireless LAN security </li></ul>
    9. 9. Explain the Components and Operations of Basic Wireless LAN Security <ul><li>Describe the wireless protocols. The description will include a description of 802.1x, a comparison of WPA and WPA2 as well as comparison of TKIP and AES </li></ul>
    10. 10. Explain the Components and Operations of Basic Wireless LAN Security <ul><li>Describe how to secure a wireless LAN from the key security threats </li></ul>
    11. 11. Configure and Verify Basic Wireless LAN Access <ul><li>Configure a wireless access point </li></ul>
    12. 12. Configure and Verify Basic Wireless LAN Access <ul><li>Configure a wireless NIC </li></ul>
    13. 13. Configure and Troubleshoot Wireless Client Access <ul><li>Describe how to solve access point firmware issues </li></ul>
    14. 14. Configure and Troubleshoot Wireless Client Access <ul><li>Describe how to solve incorrect channel settings </li></ul>
    15. 15. Configure and Troubleshoot Wireless Client Access <ul><li>Describe how to solve common RF interference issues </li></ul>
    16. 16. Configure and Troubleshoot Wireless Client Access <ul><li>Describe how to correct antenna misplacement </li></ul>
    17. 17. Configure and Troubleshoot Wireless Client Access <ul><li>Describe how to solve the common problems associated with wireless LAN encryption types </li></ul>
    18. 18. Configure and Troubleshoot Wireless Client Access <ul><li>Describe how to solve authentication problems associated with wireless LANs </li></ul>
    19. 19. Summary <ul><li>Wireless LANs use standards such as </li></ul><ul><ul><li>IEEE 802.11a </li></ul></ul><ul><ul><li>IEEE 802.11b </li></ul></ul><ul><ul><li>IEEE 802.11g </li></ul></ul><ul><ul><li>IEEE 802.11n </li></ul></ul><ul><li>Basic Service set </li></ul><ul><ul><li>Mobile clients use a single access point for connectivity </li></ul></ul><ul><li>Extended service set </li></ul><ul><ul><li>Multiple access point that share an SSID </li></ul></ul>
    20. 20. Summary <ul><li>WLAN security practices/methods include </li></ul><ul><ul><li>MAC address filtering </li></ul></ul><ul><ul><li>SSID making </li></ul></ul><ul><ul><li>Implementing WPA2 </li></ul></ul><ul><li>Configuration of wireless NIC and access point </li></ul><ul><ul><li>Configure both of them the same way </li></ul></ul><ul><ul><ul><li>SSID </li></ul></ul></ul><ul><ul><li>Ensure that the latest firmware is installed </li></ul></ul><ul><li>Troubleshooting WLANs include doing the following: </li></ul><ul><ul><li>Check channel setting </li></ul></ul><ul><ul><li>Check for interference </li></ul></ul>

    ×