LAN Switching and Wireless – Chapter 6 Sandra Coleman, CCNA, CCAI.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and...
-
Upload
melina-rich -
Category
Documents
-
view
214 -
download
0
Transcript of 20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and...
April 21, 2023 RE Meyers, Ms.Ed., CCAI
CCNA Discovery Curriculum ReviewCCNA Discovery Curriculum Review
Networking for Home and Small BusinessesNetworking for Home and Small Businesses
Chapter 7:Chapter 7:
Wireless Technologies
April 21, 2023 RE Meyers, Ms.Ed., CCAI
DisclaimerDisclaimer
This review is not a comprehensive learning model of the curriculum!It is intended for chapter pre-exam prep, or post exam
review.Using this presentation as your sole source of teaching or
learning will not provide all the information you need to be successful in the Cisco Networking Academy.
All materials, images, text, and content unless noted remains the licensed property of the Cisco Networking Academy.
Please report all errors as soon as possible to:• [email protected]
April 21, 2023 RE Meyers, Ms.Ed., CCAI
ObjectivesObjectives
Describe wireless technologies.Describe the various components and structure of
a WLAN Describe wireless LAN security issues and
mitigation strategiesConfigure an integrated wireless access point and
a wireless client .
April 21, 2023 RE Meyers, Ms.Ed., CCAI
ICG: Section 7.1ICG: Section 7.1
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless Technology Wireless Technology 7.1.17.1.1
Wireless operates in 2.4GHZ range
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless Technology Wireless Technology 7.1.17.1.1
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless Technology Wireless Technology 7.1.27.1.2
Advantages over wired LAN’sAnytime anywhere connectivityEasy to install; inexpensiveEasy to add devicesMobilityGreater resources
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless TechnologyWireless Technology
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless Technology Wireless Technology 7.1.37.1.3
April 21, 2023 RE Meyers, Ms.Ed., CCAI
ICG: Section 7.2ICG: Section 7.2
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless LAN’sWireless LAN’s
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless LAN’s Wireless LAN’s 7.2.17.2.1
The Wi-Fi logo on a device means that this equipment meets standards and should interoperate with other devices of the same standard.
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless LAN’s Wireless LAN’s 7.2.27.2.2
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless LAN’s Wireless LAN’s 7.2.27.2.2
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless LAN’s Wireless LAN’s 7.2.27.2.2
SSID – Service Set IdentifierTells wireless devices which WLAN they belong toAll devices in the WLAN must have the same SSID
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless LAN’s Wireless LAN’s 7.2.37.2.3
Two basic wireless modesIBSS – ad hoc connects clients in peer-to-peerBSS - infrastructure
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless LAN’sWireless LAN’s
Channels are created by dividing up the available RF spectrum.
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless LAN’s Wireless LAN’s 7.2.57.2.5
Most home AP devices can support various modes, mainly 802.11b, 802.11g, and 802.11n
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Wireless LAN’s Wireless LAN’s 7.2.57.2.5
SSID Broadcast enabled sends that this router is available
April 21, 2023 RE Meyers, Ms.Ed., CCAI
ICG: Section 7.3ICG: Section 7.3
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Security Considerations on a WLANSecurity Considerations on a WLAN
An attacker can access your network from any location your wireless signal reaches.
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Security Considerations on a WLAN Security Considerations on a WLAN 7.3.17.3.1
Change the default settingsSSIDsPasswordsIP addresses
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Security Considerations on a WLANSecurity Considerations on a WLAN
MAC address filtering uses the MAC address to identify which devices are allowed to connect to the wireless network
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Security Considerations on a WLAN Security Considerations on a WLAN 7.3.37.3.3
AP authenticationOpen authentication is used by defaultPre-shared keys (PSK) - AP and client must be
configured with the same key or secret wordExtensible Authentication Protocol (EAP) - client
communicates with a backend authentication server
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Security Considerations on a WLAN Security Considerations on a WLAN 7.3.47.3.4
Encryption is the process of transforming data so that even if it is intercepted it is unusableWired Equivalency Protocol (WEP) uses pre-configured
keys 64 bits or 128 bits longWi-Fi Protected Access (WPA) is more secure than WEP
because it is significantly more difficult to crack.
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Security Considerations on a WLAN Security Considerations on a WLAN 7.3.57.3.5
Traffic filtering blocks undesirable traffic from entering or leaving the wireless network.
April 21, 2023 RE Meyers, Ms.Ed., CCAI
ICG: Section 7.4ICG: Section 7.4
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Configuring and ISR and ClientConfiguring and ISR and Client
Plan for a wireless LAN implementation
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Configuring and ISR and ClientConfiguring and ISR and Client
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Configuring and ISR and ClientConfiguring and ISR and Client
April 21, 2023 RE Meyers, Ms.Ed., CCAI
Configuring and ISR and ClientConfiguring and ISR and Client
April 21, 2023 RE Meyers, Ms.Ed., CCAI
SummarySummary
Wireless technologies use electromagnetic radiation in the form of radio signals to carry information between devices.
Ease and convenience of connecting devices wirelessly creates security concerns that need to be addressed.
Before installing wireless devices, an installation plan should be created which includes strategies for layout and security.
April 21, 2023 RE Meyers, Ms.Ed., CCAI