SlideShare a Scribd company logo
WI-FI
Wireless Fidelity - Basic Introduction

Rogelio Gomez
http://ar.linkedin.com/in/rogeliogomez
Index
• Standards
• Authentication
• Cable Modems with Wi-Fi
Standards
• IEEE 802.11a (5 GHz)
• IEEE 802.11b (2.4 GHz – 11 Mbps)
• IEEE 802.11g (2.4 GHz - 54 Mbps)
• 802.11g+ (100 Mbps)
• Can coexists with a and b
• IEEE 802.11n (2.4 GHz and 5 GHz - MIMO 600 Mbps)

• Also there are private vendors standards
802.11a
• 12 non-overlapping channels – 8 for network 4 for point-

to-point
• No IOP with 802.11b
• 5 Ghz better performance than b/g
• 54 Mbps

802.11b
• 13 channel with overlapping
• 2.4 Ghz
• 11 Mbps
802.11g
• Improves b to reach 54 Mbps
• The total (20 Mhz) 13 overlapping channels
• Back compatible with b in 2.4 Ghz

802.11n
• MIMO Multiple Input Multiple Output (major improvement)
• Channel Bonding to make 40 Mhz channel will have 9

channels available
• The total in 20 Mhz are 13 channels
• Newer and full compatible backwards
Configuration
• SSID
• Name up to 32 characters
• Disable Broadcast
• Multiple SSIDs configuration , when this happens we set a VLAN
for each SSID
Authentication
WEP (10c- 26c 64/128 bit static encryption RC4)
Open: This option doesn’t authenticate the user. It has the
following options:
• No Encryption: Doesn’t encrypt the communication.
• WEP Encryption: Specifies WEP encryption is used. We should select

where to store the WEP key
• Key Source:
• Local: The WEP key is stored in the device. Usually by default. If this option is selected
the key should be generated selecting the length, format and value
• Server: Indicates that the WEP key is dynamically generated by the RADIUS server.
• Both: The Key is stored locally and in the RADIUS Server.

• Auth Server: Indicates that the WEP key is stored in an authentication
server.

WEP Shared Key: The WEP key is pre shared in order to
authenticate the user before the communication starts
Auto: Specifies that both methods are accepted Open y Shared
Key.
Authentication
• WPA/WPA2/WPA
•
•

Vulnerability when activating WPS (Wi-Fi Protected Setup) and WPA
WPA2 supports CCMP encryption (AES – Advanced Encryption Standard)

• WPA/WPA2/WPA Auto Pre-Shared Key PSK: Allows to create a shared key that all clients will

store. With the options:
•
•
•

HEXA key: The key should be 256-bit (64 characters) in hexadecimal.
Key by password: The password must contain between 8-63 ASCII characters.
Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is
1800 seconds. You can also specify 0 to disable key updates.
• Encryption Type: You can choose the following options:
•
•
•

TKIP: TKIP Temporary Key Integrity Protocol generates a key of 128 bit per package using RC4 with a new key per package
AES: Advanced Encryption Standard. Uses CCMP encryption.
Auto: Can select between AES or Temporal Key Integrity Protocol (TKIP) Usually this option uses AES at first if no connection
then it falls back to TKIP

• WPA/WPA2/WPA Authentication Server: Wi-Fi Protected Access (WPA) authentication with a

server. If you enable WPA, WPA2, or WPA authentication, you must also configure the
authentication server.
• After selecting an authentication method, enter authentication server information with the
following:
•

Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is
1800 seconds. You can also specify 0 to disable key updates.
• Encryption Type: Specify the encryption method between the AP and the client:
•
•
•

Auto
TKIP
AES

• The Mixed WPA/WPA2 method usually tries with WPA2 if is not successful it falls back to

WPA. The standard for WPA2 is 802.11i (WPA has no standardization)
Cable Modems with Wi-Fi
• Cisco DPC2525
• Ubee
• Thomson DWG855
• Cisco DPC2420
Cisco DPC2525
• Wireless
• 802.11g con 4 SSIDs
• Wireless Multimedia (WIMM) including Wi-Fi Protected Setup by
button
• Dual Antenna
• Ethernet
• 4 ports
• Firewall
• Parental Control
• Voice
• Upgradeable to SIP
• Codecs G.711, T.38, G.729, BV16
• Codec Encryption AES-128
• Call Features Support (Caller ID, Call Waiting, Call Forwarding, Call
Transfer)
• 2 Voice Ports
Ubee
• Wireless
• SSID
• Security
• WPA2-PSK con AES recommended
• Wi-Fi Protected Setup (push button or PIN method)

• 802.11 Frequency 802.11b/g/n 2.4 GHz some support 5 GHz. Can select the

channels or just use AUTO
• RSSI Receive Signal Strength Indicator: Indicates the signal level for each
connected device

• Firewall
• DMZ
• Port Scan Detection
• Filter Cookies
• IP Flood attack
• Content Filter
• DHCP
• Port Forwarding
Thomson DWG855
• Voice
• 2 RJ11
• RAS & 56 bit encryption security
• V.90 fax
• Wireless
• SSID
• Name – Open - Close

•
•
•
•
•

Channel (11 channels - the TWG850 13 channels
Enable / Disable
Security (WPA/WPA2/WEP/802.1x Radius)
Access Control (MAC allow/restric)
Advanced (Proprietary Air Interface, Rate, Output Power, Beacon
interval)
• Bridging WDS (Wireless Distribution System) allows to interconnect
APs options: Enable/Disable/Remote Bridges MAC(up to 4)
Cisco DPC2420
• Voice
• 2 Ports
• Ethernet
• 1 Port
• Wireless
• Basic (up to 11 channels– SSID)
• Security (WEP/WPA/WPA2 - WPS)
• Advanced (data rates and thresholds)
• Access Control (filter by MAC, SSID broadcast, Open system o PSK)
• WDS Wireless Distribution System
• Parental Control
• User Setup (create users profile and apply access rules to those users)
• Basic Rules (create rules and block content information)
• Time of the Day Rules (block all traffic in certain time)
• Local Log
• Firewall
• Web Pages filtering
• Event Logging & email config for Alerts
• Basic Setting (Network config, time NTP, Mngmt IP, Network)
• Advanced Settings
• IP Address Filtering
• MAC Address Filtering
• Port Filtering
• Port Forwarding
• DDNS (Dynamic DNS – Requires previous subscription to a provider of DDNS – user password host)
• Port Triggers (deactivate port when no activity)
• DMZ Host (Set IP visibity from outside by passing the firewall)
• VPN Termination (configuration and protocol control and VPN tunnels)
THANKS!

More Related Content

What's hot

CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network Monitoring
Networkel
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
Adhie Lesmana
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to point
Networkel
 
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Arif Hossen
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
n|u - The Open Security Community
 
CCNA Routing Basics
CCNA Routing BasicsCCNA Routing Basics
CCNA Routing Basics
Networkel
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLS
Sam Bowne
 
Network Access - CCNA 200-125 Training
Network Access - CCNA 200-125 TrainingNetwork Access - CCNA 200-125 Training
Network Access - CCNA 200-125 Training
Networkel
 
CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)
Networkel
 
CCNA eBGP Protocol
CCNA eBGP ProtocolCCNA eBGP Protocol
CCNA eBGP Protocol
Networkel
 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
Akbar Azwir, MM, PMP, PMI-SP, PSM I, CISSP
 
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek Corp.
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASA
Dhruv Sharma
 
Mikrotik advanced
Mikrotik advancedMikrotik advanced
Mikrotik advanced
guest8423a64e
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]
Setia Juli Irzal Ismail
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik Router
KHNOG
 
CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)
Networkel
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
gocybersec
 
CCNA Inter VLAN Routing
CCNA Inter VLAN RoutingCCNA Inter VLAN Routing
CCNA Inter VLAN Routing
Networkel
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)
Networkel
 

What's hot (20)

CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network Monitoring
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to point
 
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
CCNA Routing Basics
CCNA Routing BasicsCCNA Routing Basics
CCNA Routing Basics
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLS
 
Network Access - CCNA 200-125 Training
Network Access - CCNA 200-125 TrainingNetwork Access - CCNA 200-125 Training
Network Access - CCNA 200-125 Training
 
CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)
 
CCNA eBGP Protocol
CCNA eBGP ProtocolCCNA eBGP Protocol
CCNA eBGP Protocol
 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
 
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASA
 
Mikrotik advanced
Mikrotik advancedMikrotik advanced
Mikrotik advanced
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik Router
 
CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
CCNA Inter VLAN Routing
CCNA Inter VLAN RoutingCCNA Inter VLAN Routing
CCNA Inter VLAN Routing
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)
 

Viewers also liked

Wi fi network
Wi fi networkWi fi network
Wi fi network
yogeshparmar101
 
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Syed Ariful Islam Emon
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
Syed Ariful Islam Emon
 
Wi fi
Wi fiWi fi
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
Tom Hanstead
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
Bhushan Jadhav
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
bhavanatmithun
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Abdelkhalik Mosa
 

Viewers also liked (9)

Wi fi network
Wi fi networkWi fi network
Wi fi network
 
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
 
Wi fi
Wi fiWi fi
Wi fi
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 

Similar to Wi Fi Technology - What you don't see you don't care...

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
tardeep
 
Wifi
WifiWifi
Wireless ac easy upgrader
Wireless ac easy upgraderWireless ac easy upgrader
Wireless ac easy upgrader
sonn jita
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
eceb9198
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
Inocentshuja Ahmad
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
Tom Isaacson
 
Ac1750 dual band wireless router
Ac1750 dual band wireless routerAc1750 dual band wireless router
Ac1750 dual band wireless router
sonn jita
 
lm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptxlm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptx
LucintaLuna4
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
cmstiernberg
 
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APEmbedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Ahmed El-Arabawy
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Wireless networks
Wireless networksWireless networks
Wireless networks
Derick Ochia
 
Wireless networks
Wireless networksWireless networks
Wireless networks
Joland Reambillo
 
Wireless networks
Wireless networksWireless networks
Wireless networks
SYEDJAMAESHA
 
Tutorial and Review TP Link Archer C54.pdf
Tutorial and Review TP Link Archer C54.pdfTutorial and Review TP Link Archer C54.pdf
Tutorial and Review TP Link Archer C54.pdf
bamscapri
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
xdarlord
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
PREMKUMAR
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
Napier University
 
Sales presentation ECB1200
Sales presentation ECB1200Sales presentation ECB1200
Sales presentation ECB1200
EnGenius Europe
 

Similar to Wi Fi Technology - What you don't see you don't care... (20)

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Wireless ac easy upgrader
Wireless ac easy upgraderWireless ac easy upgrader
Wireless ac easy upgrader
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
Ac1750 dual band wireless router
Ac1750 dual band wireless routerAc1750 dual band wireless router
Ac1750 dual band wireless router
 
lm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptxlm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptx
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APEmbedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Tutorial and Review TP Link Archer C54.pdf
Tutorial and Review TP Link Archer C54.pdfTutorial and Review TP Link Archer C54.pdf
Tutorial and Review TP Link Archer C54.pdf
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
 
Sales presentation ECB1200
Sales presentation ECB1200Sales presentation ECB1200
Sales presentation ECB1200
 

More from Rogelio Gomez

Evolution of the species enhanced
Evolution of the species enhancedEvolution of the species enhanced
Evolution of the species enhanced
Rogelio Gomez
 
Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2
Rogelio Gomez
 
White paper La video Revolucion
White paper   La video RevolucionWhite paper   La video Revolucion
White paper La video Revolucion
Rogelio Gomez
 
White paper La era de servicios en la nube
White paper La era de servicios en la nubeWhite paper La era de servicios en la nube
White paper La era de servicios en la nube
Rogelio Gomez
 
Cloud Storage De La Mejor Manera
Cloud Storage De La Mejor ManeraCloud Storage De La Mejor Manera
Cloud Storage De La Mejor Manera
Rogelio Gomez
 
Las mejores practicas para diseñar comunicaciones en IP en un Contact Center
Las mejores practicas para  diseñar  comunicaciones en IP en un Contact CenterLas mejores practicas para  diseñar  comunicaciones en IP en un Contact Center
Las mejores practicas para diseñar comunicaciones en IP en un Contact Center
Rogelio Gomez
 
EPC Introduction & Market
EPC Introduction & MarketEPC Introduction & Market
EPC Introduction & Market
Rogelio Gomez
 
GPON Introduction
GPON IntroductionGPON Introduction
GPON Introduction
Rogelio Gomez
 
IMS Presentation
IMS PresentationIMS Presentation
IMS Presentation
Rogelio Gomez
 

More from Rogelio Gomez (9)

Evolution of the species enhanced
Evolution of the species enhancedEvolution of the species enhanced
Evolution of the species enhanced
 
Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2
 
White paper La video Revolucion
White paper   La video RevolucionWhite paper   La video Revolucion
White paper La video Revolucion
 
White paper La era de servicios en la nube
White paper La era de servicios en la nubeWhite paper La era de servicios en la nube
White paper La era de servicios en la nube
 
Cloud Storage De La Mejor Manera
Cloud Storage De La Mejor ManeraCloud Storage De La Mejor Manera
Cloud Storage De La Mejor Manera
 
Las mejores practicas para diseñar comunicaciones en IP en un Contact Center
Las mejores practicas para  diseñar  comunicaciones en IP en un Contact CenterLas mejores practicas para  diseñar  comunicaciones en IP en un Contact Center
Las mejores practicas para diseñar comunicaciones en IP en un Contact Center
 
EPC Introduction & Market
EPC Introduction & MarketEPC Introduction & Market
EPC Introduction & Market
 
GPON Introduction
GPON IntroductionGPON Introduction
GPON Introduction
 
IMS Presentation
IMS PresentationIMS Presentation
IMS Presentation
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Wi Fi Technology - What you don't see you don't care...

  • 1. WI-FI Wireless Fidelity - Basic Introduction Rogelio Gomez http://ar.linkedin.com/in/rogeliogomez
  • 3. Standards • IEEE 802.11a (5 GHz) • IEEE 802.11b (2.4 GHz – 11 Mbps) • IEEE 802.11g (2.4 GHz - 54 Mbps) • 802.11g+ (100 Mbps) • Can coexists with a and b • IEEE 802.11n (2.4 GHz and 5 GHz - MIMO 600 Mbps) • Also there are private vendors standards
  • 4. 802.11a • 12 non-overlapping channels – 8 for network 4 for point- to-point • No IOP with 802.11b • 5 Ghz better performance than b/g • 54 Mbps 802.11b • 13 channel with overlapping • 2.4 Ghz • 11 Mbps
  • 5. 802.11g • Improves b to reach 54 Mbps • The total (20 Mhz) 13 overlapping channels • Back compatible with b in 2.4 Ghz 802.11n • MIMO Multiple Input Multiple Output (major improvement) • Channel Bonding to make 40 Mhz channel will have 9 channels available • The total in 20 Mhz are 13 channels • Newer and full compatible backwards
  • 6. Configuration • SSID • Name up to 32 characters • Disable Broadcast • Multiple SSIDs configuration , when this happens we set a VLAN for each SSID
  • 7. Authentication WEP (10c- 26c 64/128 bit static encryption RC4) Open: This option doesn’t authenticate the user. It has the following options: • No Encryption: Doesn’t encrypt the communication. • WEP Encryption: Specifies WEP encryption is used. We should select where to store the WEP key • Key Source: • Local: The WEP key is stored in the device. Usually by default. If this option is selected the key should be generated selecting the length, format and value • Server: Indicates that the WEP key is dynamically generated by the RADIUS server. • Both: The Key is stored locally and in the RADIUS Server. • Auth Server: Indicates that the WEP key is stored in an authentication server. WEP Shared Key: The WEP key is pre shared in order to authenticate the user before the communication starts Auto: Specifies that both methods are accepted Open y Shared Key.
  • 8. Authentication • WPA/WPA2/WPA • • Vulnerability when activating WPS (Wi-Fi Protected Setup) and WPA WPA2 supports CCMP encryption (AES – Advanced Encryption Standard) • WPA/WPA2/WPA Auto Pre-Shared Key PSK: Allows to create a shared key that all clients will store. With the options: • • • HEXA key: The key should be 256-bit (64 characters) in hexadecimal. Key by password: The password must contain between 8-63 ASCII characters. Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is 1800 seconds. You can also specify 0 to disable key updates. • Encryption Type: You can choose the following options: • • • TKIP: TKIP Temporary Key Integrity Protocol generates a key of 128 bit per package using RC4 with a new key per package AES: Advanced Encryption Standard. Uses CCMP encryption. Auto: Can select between AES or Temporal Key Integrity Protocol (TKIP) Usually this option uses AES at first if no connection then it falls back to TKIP • WPA/WPA2/WPA Authentication Server: Wi-Fi Protected Access (WPA) authentication with a server. If you enable WPA, WPA2, or WPA authentication, you must also configure the authentication server. • After selecting an authentication method, enter authentication server information with the following: • Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is 1800 seconds. You can also specify 0 to disable key updates. • Encryption Type: Specify the encryption method between the AP and the client: • • • Auto TKIP AES • The Mixed WPA/WPA2 method usually tries with WPA2 if is not successful it falls back to WPA. The standard for WPA2 is 802.11i (WPA has no standardization)
  • 9. Cable Modems with Wi-Fi • Cisco DPC2525 • Ubee • Thomson DWG855 • Cisco DPC2420
  • 10. Cisco DPC2525 • Wireless • 802.11g con 4 SSIDs • Wireless Multimedia (WIMM) including Wi-Fi Protected Setup by button • Dual Antenna • Ethernet • 4 ports • Firewall • Parental Control • Voice • Upgradeable to SIP • Codecs G.711, T.38, G.729, BV16 • Codec Encryption AES-128 • Call Features Support (Caller ID, Call Waiting, Call Forwarding, Call Transfer) • 2 Voice Ports
  • 11. Ubee • Wireless • SSID • Security • WPA2-PSK con AES recommended • Wi-Fi Protected Setup (push button or PIN method) • 802.11 Frequency 802.11b/g/n 2.4 GHz some support 5 GHz. Can select the channels or just use AUTO • RSSI Receive Signal Strength Indicator: Indicates the signal level for each connected device • Firewall • DMZ • Port Scan Detection • Filter Cookies • IP Flood attack • Content Filter • DHCP • Port Forwarding
  • 12. Thomson DWG855 • Voice • 2 RJ11 • RAS & 56 bit encryption security • V.90 fax • Wireless • SSID • Name – Open - Close • • • • • Channel (11 channels - the TWG850 13 channels Enable / Disable Security (WPA/WPA2/WEP/802.1x Radius) Access Control (MAC allow/restric) Advanced (Proprietary Air Interface, Rate, Output Power, Beacon interval) • Bridging WDS (Wireless Distribution System) allows to interconnect APs options: Enable/Disable/Remote Bridges MAC(up to 4)
  • 13. Cisco DPC2420 • Voice • 2 Ports • Ethernet • 1 Port • Wireless • Basic (up to 11 channels– SSID) • Security (WEP/WPA/WPA2 - WPS) • Advanced (data rates and thresholds) • Access Control (filter by MAC, SSID broadcast, Open system o PSK) • WDS Wireless Distribution System • Parental Control • User Setup (create users profile and apply access rules to those users) • Basic Rules (create rules and block content information) • Time of the Day Rules (block all traffic in certain time) • Local Log • Firewall • Web Pages filtering • Event Logging & email config for Alerts • Basic Setting (Network config, time NTP, Mngmt IP, Network) • Advanced Settings • IP Address Filtering • MAC Address Filtering • Port Filtering • Port Forwarding • DDNS (Dynamic DNS – Requires previous subscription to a provider of DDNS – user password host) • Port Triggers (deactivate port when no activity) • DMZ Host (Set IP visibity from outside by passing the firewall) • VPN Termination (configuration and protocol control and VPN tunnels)