• Configure and verify basic wireless LAN access.. • Configure and troubleshoot wireless client access... The switch is the point where the client gains access to the network.. • In a w
Trang 1CCNA – Semester 3
Chapter 7: Basic Wireless
Concepts and Configuration
CCNA Exploration 4.0
Trang 22
Objectives
• Describe the components and operations of basic
wireless LAN topologies
• Describe the components and operations of basic
wireless LAN security
• Configure and verify basic wireless LAN access
• Configure and troubleshoot wireless client access
Trang 33
The Wireless LAN
Trang 44
Why Use Wireless?
• Business networks today are evolving to support people who are on the move
• Mobility environment: where people can take their
connection to the network along with them on the road
• There are many different infrastructures (wired LAN, service provider networks) that allow mobility like this to happen, but
in a business environment, the most important is the WLAN
• People now expect to be connected at any time and place
Trang 55
Wireless Technologies
Trang 66
Wireless LAN
Trang 77
Comparing a WLAN to a LAN
• In an 802.3 Ethernet LAN, each client has
a cable that connects the client NIC to a
switch The switch is the point where the
client gains access to the network
• In a wireless LAN, each client uses a
wireless adapter to gain access to the
network through a wireless device such as
a wireless router or access point
Trang 88
Wireless standards
Trang 99
Wireless Infrastructure Components
Trang 1111
802.11 Topologies: Ad hoc Network
Trang 1212
802.11 Topologies: Basic Service Sets
Trang 1313
802.11 Topologies: Extended Service
Sets
Trang 1414
Client and Access Point Association
• Beacon
Trang 1515
Client and Access Point Association
Trang 1616
Client and Access Point Association
Step 3 - 802.11 Association
Trang 1717
Planning the Wireless LAN
Trang 1818
Planning the Wireless LAN
Trang 1919
Planning the Wireless LAN
Trang 2020
Planning the Wireless LAN
Trang 2121
Wireless LAN Security
Trang 2222
Wireless LAN Security Threats
Unauthorized Access
Trang 2323
Wireless LAN Security Threats
Trang 2424
Wireless LAN Security Threats
• Denial of Service
Trang 2525
Wireless Security Protocols
Trang 2626
Wireless Security Protocols
Trang 2727
Wireless Security Protocols
Trang 2828
Wireless Security Protocols
• Encryption
Trang 2929
Securing a Wireless LAN
Trang 3030
Configure Wireless LAN Access
Trang 3131
Configuring the Wireless Access Point
Trang 3232
Setup: Basic Setup
Trang 3333
Administration: Management
Trang 3434
Configuring Basic Wireless Settings
Trang 3535
Security Mode
• Select the mode you want to use: PSK-Personal,
PSK2-Personal, PSK-Enterprise, PSK2-Enterprise, RADIUS, or
WEP
Trang 3636
Mode Parameters
• Enterprise modes are not configured in this chapter
Trang 3737
Configure Encryption and Key
Trang 3838
Configure a wireless NIC: Scan SSID
Trang 3939
Configure a wireless NIC: Scan SSID
Trang 4040
Select the Wireless Security Protocol
• Practice: 7.3.2.4
Trang 4141
Troubleshooting
Simple WLAN Problems
Trang 42• Step 2 - Confirm the physical status of WLAN devices
• Step 3 - Inspect wired links
Trang 4343
Updating the Access Point Firmware
Trang 4444
Incorrect Channel Settings
Trang 4545
Incorrect Channel Settings: Solution
Trang 4646
Solving RF Interference
Trang 4747
Solving RF Interference
• Site Surveys
Trang 4848
Site Survey
• Two categories: Manual and utility assisted
• Manual site surveys can include a site evaluation to be
followed by a more thorough utility-assisted site survey A site evaluation involves inspecting the area with the goal of identifying potential issues that could impact the network
Specifically, look for the presence of multiple WLANs,
unique building structures, such as open floors and
atriums, and high client usage variances, such as those
caused by differences in day or night shift staffing levels
• Note: you do not conduct site surveys as part of this course
Trang 4949
Access Point Misplacement
Trang 5050
Access Point Misplacement: Solution
Trang 5151
Access Point Misplacement: Solution
• Ensure that access points are not mounted closer than 7.9 inches (20 cm) from the body of all persons
• Do not mount the access point within 3 feet (91.4 cm) of metal
• Do not mount the access point outside of buildings
• Do not mount the access point on building perimeter walls, unless
outside coverage is desired
• When mounting an access point in the corner of a right-angle hallway
intersection, mount it at a 45-degree angle to the two hallways The
access point internal antennas are not omnidirectional and cover a
larger area when mounted this way
Trang 5252
Problems with Authentication and Encrytion
Trang 5353
Problems with Authentication and Encrytion
Trang 5454
Problems with Authentication and Encrytion
Trang 5555
Summary
Trang 5656