Transcript Ethernet

Wireless
Chapter 7
CCNA Exploration Semester 3
Modified by Profs. Ward
and Cappellino
1
Topics




Components and basic operation of wireless
LANs
Basic WLAN security
Configure and verify basic wireless LAN
access
Troubleshoot wireless client access
2
Semester 3
LAN Design
Basic Switch
Concepts
Wireless-
Chp 7
VLANs
STP
VTP
Inter-VLAN
routing
3
Wireless Review

Wireless was covered in CSN208, therefore,
only new material will be presented here




Must have understanding of entire chapter
Please see me, the curriculum or the CSN208 text
with questions
Review- what is an AP?
Review- what is a wireless NIC?
4
Wireless router

Acts as:





Router for use in ___________________
Ethernet ______________ and
wireless __________________________
Configuration on both the ____________________ is
necessary
Parameters:



Mode refers to the 802.11a, b, g, or n
Configure SSID – what is the SSID?
Select channel within 2.4GHz band

_________________________ should be set to use
_____________________________5
Channel Graph
6
Different 802.11 Wireless Topologies…



Ad Hoc
Basis Service Set (BSS)
Extended Service Set (ESS)
More to come on each of these…
7
______________ topology





WLAN operating with
_________________
_________________
Negotiate parameters
Independent basic
service set
Area covered is basic
service area (_____)
8
__________________ topology




_________________
Access point _________
____________________
___________________
for clients
Uses _________ mode
Area covered is basic
service area (_______).
9
________________ topology




_____________________
___________________
Access point manages
parameters for clients
__________ mode used
Area covered is extended
service area (_____).
A common distribution system allows multiple access
points in an ESS to appear to be a single BSS.
10
Beacon and probe

Discovering a WLAN and connecting to it involves the
following components:

________ - _________ used by the WLAN
networks to _____________________


Access point may send out a beacon at regular intervals for
________________________
_________ - Frames _____________________
________________________


Client sends a probe specifying the _____________
supported. ________________________
Client can send probe with no SSID to look for any network.
Access point may be configured to respond, or not.
Components continued on next slide…
11
Authentication


Components cont…
______________ One of three ___________
__________________________



__________________________
____________________________
802.11 had two authentication mechanisms.



________ (Open Authentication) does not give privacy
Wired Equivalency Protection (__________)
Newer and more secure authentication method:
Wi-Fi Protected Access (_________)
Components continued on next slide…
12
Association


Components cont…
_______________ - The process for _________
_________________________________________
__________________________







Request from client and response.
Finalizes __________________
Finalizes ____________________
________________________
____________ the access point MAC address (_______)
Access point maps a logical port known as the association
identifier (AID) to the WLAN client.
Traffic can then flow between the two devices
13
Planning the WLAN




Implement a _____________________ prior to
construction of a WLAN
RF is a shared medium so the ______________
______________________ for RF
Place AP:




Above obstructions/ at least 3 feet from metal obstructions
Vertically and high up/in the ceiling.
In locations where users will work.
Work out the coverage for each AP.

___________________________
14
Wireless Security/Protocol review





These topics are also a review of the same
material covered in CSN208
Review- what are some security threats?
Review- what are some disruptive attacks
that could affect a business?
Review- what are some Wireless protocols
we have studied?
Review- what type of encryption does
Wireless use?
15
Controlling Access to the Wireless LAN

Possibilities for controlling access:




___________________ - __________________________
from access points
 __________ considered a ___________________ since
SSID can still be easily discovered
____________________ - Tables are manually
constructed on the access point to _________________
__________________________________
 _____________ considered a way to secure a WLAN since
______________________________
WLAN _____________________ - ________________
______________________________ of the AP
16
Configuring Access Point
Remember:



To configure and test incrementally
Most access points have been _______________________
______________________ with the default settings

________________________________!
17
Basic Wireless Settings


_______________ – Lets you choose the
right mode for your devices. B, G, N, mixed
or BG mixed. You can disable wireless
operation.
__________________ – should be changed
from the default.


______________________________ on the
network.
_____________ can be enabled or disabled.
18
More Basic Wireless Settings

Radio Band –


For best performance, keep the __________.
For Wireless-N devices only, select Wide 40MHz Channel.


If you selected Wide for the Radio Band, Select a
channel from the drop-down menu of the “Wide
Channel” parameter
For Wireless-G and Wireless-B only, select
Standard - 20MHz Channel.

If you selected Standard for the Radio Band, Select a
channel from the drop-down menu of the “Standard
Channel” parameter
See summary graphic next slide…
19
Summary of Linksys Settings
20
Configure Security on the Linksys







Security mode
Mode parameters
RADIUS Server IP address
RADIUS Server Port
Encryption
Pre-shared Key
Key Renewal
21
Configure Security on the
Linksys cont…

Choose _____________________ if all client
devices are able to use it.


If some older devices do not support WPA2 then choose
the best security mode that is supported by all devices.
Encryption – _______________________. Use AES
with WPA2.
22
Configure the client



After the access point has been configured, you
need to ___________________________________
to allow it to connect to the wireless network.
First, scan for available WLAN’s and SSID’s
If a WLAN does not show up on an auto scan- what
could be the problem?


Proceed manually
 Add a wireless network
 Enter the SSID
 Choose the authentication method
 Choose the encryption method
 Enter the network key.
Now confirm connectivity with the AP using ping
23
Troubleshooting _____________

Generally start with the ___________________
__________________ the TCP/IP stack…

Check the ________________________ then
Update __________________

24
Troubleshooting – no connectivity




Check that the PC has an ___________
Try connecting the PC to the wired network
and ping a known address
Try a ___________________. Reload drivers
as necessary.
Check the ______________________
settings on the client. Do they match the
access point?
25
Troubleshooting – poor connection



Check __________________
Check the ______________ on the client.
Check for devices that might be causing
______________ (cordless phone,
microwave oven etc).
26
Troubleshooting –
additional questions





Are all devices in place?
Are they all powered on?
Are wired links working correctly?
Is there a neighboring access point using an
overlapping wave band?
Are access points badly placed?
27