1. Trang chủ
  2. » Công Nghệ Thông Tin

cấu trúc mạng lan

56 317 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Cấu Trúc Mạng LAN
Chuyên ngành Network Technology
Thể loại Lecture notes
Định dạng
Số trang 56
Dung lượng 2,54 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

• Configure and verify basic wireless LAN access.. • Configure and troubleshoot wireless client access... The switch is the point where the client gains access to the network.. • In a w

Trang 1

CCNA – Semester 3

Chapter 7: Basic Wireless

Concepts and Configuration

CCNA Exploration 4.0

Trang 2

2

Objectives

• Describe the components and operations of basic

wireless LAN topologies

• Describe the components and operations of basic

wireless LAN security

• Configure and verify basic wireless LAN access

• Configure and troubleshoot wireless client access

Trang 3

3

The Wireless LAN

Trang 4

4

Why Use Wireless?

• Business networks today are evolving to support people who are on the move

• Mobility environment: where people can take their

connection to the network along with them on the road

• There are many different infrastructures (wired LAN, service provider networks) that allow mobility like this to happen, but

in a business environment, the most important is the WLAN

• People now expect to be connected at any time and place

Trang 5

5

Wireless Technologies

Trang 6

6

Wireless LAN

Trang 7

7

Comparing a WLAN to a LAN

• In an 802.3 Ethernet LAN, each client has

a cable that connects the client NIC to a

switch The switch is the point where the

client gains access to the network

• In a wireless LAN, each client uses a

wireless adapter to gain access to the

network through a wireless device such as

a wireless router or access point

Trang 8

8

Wireless standards

Trang 9

9

Wireless Infrastructure Components

Trang 11

11

802.11 Topologies: Ad hoc Network

Trang 12

12

802.11 Topologies: Basic Service Sets

Trang 13

13

802.11 Topologies: Extended Service

Sets

Trang 14

14

Client and Access Point Association

• Beacon

Trang 15

15

Client and Access Point Association

Trang 16

16

Client and Access Point Association

Step 3 - 802.11 Association

Trang 17

17

Planning the Wireless LAN

Trang 18

18

Planning the Wireless LAN

Trang 19

19

Planning the Wireless LAN

Trang 20

20

Planning the Wireless LAN

Trang 21

21

Wireless LAN Security

Trang 22

22

Wireless LAN Security Threats

Unauthorized Access

Trang 23

23

Wireless LAN Security Threats

Trang 24

24

Wireless LAN Security Threats

• Denial of Service

Trang 25

25

Wireless Security Protocols

Trang 26

26

Wireless Security Protocols

Trang 27

27

Wireless Security Protocols

Trang 28

28

Wireless Security Protocols

• Encryption

Trang 29

29

Securing a Wireless LAN

Trang 30

30

Configure Wireless LAN Access

Trang 31

31

Configuring the Wireless Access Point

Trang 32

32

Setup: Basic Setup

Trang 33

33

Administration: Management

Trang 34

34

Configuring Basic Wireless Settings

Trang 35

35

Security Mode

• Select the mode you want to use: PSK-Personal,

PSK2-Personal, PSK-Enterprise, PSK2-Enterprise, RADIUS, or

WEP

Trang 36

36

Mode Parameters

Enterprise modes are not configured in this chapter

Trang 37

37

Configure Encryption and Key

Trang 38

38

Configure a wireless NIC: Scan SSID

Trang 39

39

Configure a wireless NIC: Scan SSID

Trang 40

40

Select the Wireless Security Protocol

• Practice: 7.3.2.4

Trang 41

41

Troubleshooting

Simple WLAN Problems

Trang 42

• Step 2 - Confirm the physical status of WLAN devices

• Step 3 - Inspect wired links

Trang 43

43

Updating the Access Point Firmware

Trang 44

44

Incorrect Channel Settings

Trang 45

45

Incorrect Channel Settings: Solution

Trang 46

46

Solving RF Interference

Trang 47

47

Solving RF Interference

• Site Surveys

Trang 48

48

Site Survey

• Two categories: Manual and utility assisted

• Manual site surveys can include a site evaluation to be

followed by a more thorough utility-assisted site survey A site evaluation involves inspecting the area with the goal of identifying potential issues that could impact the network

Specifically, look for the presence of multiple WLANs,

unique building structures, such as open floors and

atriums, and high client usage variances, such as those

caused by differences in day or night shift staffing levels

Note: you do not conduct site surveys as part of this course

Trang 49

49

Access Point Misplacement

Trang 50

50

Access Point Misplacement: Solution

Trang 51

51

Access Point Misplacement: Solution

• Ensure that access points are not mounted closer than 7.9 inches (20 cm) from the body of all persons

• Do not mount the access point within 3 feet (91.4 cm) of metal

• Do not mount the access point outside of buildings

• Do not mount the access point on building perimeter walls, unless

outside coverage is desired

• When mounting an access point in the corner of a right-angle hallway

intersection, mount it at a 45-degree angle to the two hallways The

access point internal antennas are not omnidirectional and cover a

larger area when mounted this way

Trang 52

52

Problems with Authentication and Encrytion

Trang 53

53

Problems with Authentication and Encrytion

Trang 54

54

Problems with Authentication and Encrytion

Trang 55

55

Summary

Trang 56

56

Ngày đăng: 05/07/2014, 00:52

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm

w