1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Installing, Troubleshooting, and Repairing Wireless Networks phần 9 ppsx

41 326 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Installing, Troubleshooting, and Repairing Wireless Networks phần 9 ppsx
Chuyên ngành Wireless Networks
Thể loại tài liệu hướng dẫn
Định dạng
Số trang 41
Dung lượng 777,69 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Funk—Funk Software Odyssey Server and Windows ClientOdyssey is an integrated package of the company’s Steel-BeltedRADIUS remote access authentication software with 802.1x EAP-TLS securit

Trang 1

Assembling RF Connectors 313

Trang 2

Appendix B314

Trang 3

SMA Plugs and Jacks

SMA connectors are identified by their small (1/4-inch) diametermale threading on jacks and 5/16-inch body nut on plugs Pin stylesmay be male or female on either end SMA connectors are typicallyused on small diameter RG-174/RG-316 cables for pigtails but may

be used for medium diameter RG-58/RG-142 cables for moderatelength cable runs

Trang 4

Appendix B316

Trang 5

Assembling RF Connectors 317

Trang 6

TNC Plugs and Jacks

TNC connectors are identified by their medium-size (3/8-inch) eter male threading on jacks and 7/16- to 1/2-inch knurled body nut

diam-on plugs Pin styles may be male or female diam-on either end TNC cdiam-on-nectors are typically used on medium diameter RG-58/RG-142 cablesfor moderate length cable runs and access point antennas

con-Appendix B318

Trang 7

Assembling RF Connectors 319

Trang 8

Appendix B320

Trang 9

Assembling RF Connectors 321

Trang 10

Appendix B322

Trang 11

The marketing target for most wireless LAN tools is obviouslyenterprise deployments for Microsoft Windows clients and servers I’mincluding some similar tools for Macintosh, expecting they are as easyfor you to use I’ve had a lot of fun with and learned a lot from eachand every one of them, and I think you will too Read about them, popthe CD in your drive, install them—preferably extracting andinstalling them onto your hard drive first as they do create some tem-porary and log files—and welcome to the world of wireless networking!

Resources for Windows

Copyright 2003 by The McGraw-Hill Companies, Inc Click Here for Terms of Use.

Trang 12

AirMagnet—AirMagnet Demo

AirMagnet is one of a small number of products designed for theguru of corporate WLAN implementations, providing so much infor-mation about any and all access points and client adapters withinrange of its own WLAN adapter you may be overwhelmed A veryuseful product for identifying rogue and misbehaving WLAN devicesnearby There are two versions—laptop and Windows CE/PDA—thelaptop version is more capable as far as recording and reportingwhat it finds The Windows CE version allows you to get much of thesame information the laptop version does, with portability and a sig-nal strength indication for direction finding so that you can moveabout and locate specific WLAN devices The demo versions of theproduct on the CD-ROM, for both Windows and Windows CE arecanned, with display samples only, as the full product requires a spe-cific Cisco WLAN card to run These will not show real-time data,but give you a good example of how feature-rich this product is.http://www.airmagnet.com

Appendix C324

Trang 13

AiroPeek—AiroPeek Packet Sniffer

For the true LAN techie packet sniffing is everything AiroPeek puts your WLAN adapter into listen-only mode, reveals what it sees,and gives you a lot of filtering to narrow down what you’re lookingfor Chances are you’ll need to update your wireless adapterfirmware and drivers to get it to work If you need to discover anintruder or a new threat to your network, you may have to dig downand look at streams of data packets to determine the cause.http://www.wildpackets.com/products/airopeek

Trang 14

Funk—Funk Software Odyssey Server and Windows Client

Odyssey is an integrated package of the company’s Steel-BeltedRADIUS remote access authentication software with 802.1x EAP-TLS security for Windows 2000 Odyssey provides a completeaccess control and security solution for wireless LAN deployments.This product is so easy to use I cannot imagine trying anything else

to deploy a secure, controlled WLAN solution http://www.funk.com/

Appendix C326

Trang 15

ISS—Internet Security Scanner

Internet Security Systems’ Wireless Scanner provides automateddetection and security analyses of mobile networks by utilizing802.11b to determine system vulnerabilities Fortunately it didn’treveal any security holes in my network other than I broadcast mySSID while I’m testing the WLAN http://www.iss.net

Trang 16

NetStumbler is a universal tool to use for detecting wireless networkactivity It provides significant amounts of data about each wirelessaccess point you can receive It will reveal the MAC address of activewireless devices, channels used, signal strength, SSIDs or lack there-

of, as well as whether encryption is used at a particular access point.http://www.netstumbler.com

Appendix C328

Trang 17

Radio Mobile—Roger Coudé’s Radio Mobile

If you are planning numerous or complex wireless networks thathave to cover long distances or irregular terrain, you simply cannot

do without Radio Mobile Radio Mobile uses standard geological vey maps containing terrain data to show you the signal strength of

sur-a signsur-al throughout sur-a selected sur-aresur-a This is sur-a freewsur-are progrsur-am viding features similar to very expensive commercial radio site plan-ning and coverage software You can plot point-to-point paths orpoint-to-multipoint signal distributions and see the signal strengthavailable For instructions and links to obtain map files visit theRadio Mobile website: http://www.cplus.org/rmw/english1.html

Trang 18

Tardis—Tardis 2000 and K9

I love Tardis What else can I say For years this program has beenkeeping a variety of servers and workstations on-time and in-synchwith the National Institutes of Standards and Testing’s (NIST) atom-

ic clocks You can select the time server you prefer to obtain time erences from, some public, some private, with many across theworld Tardis acts as both a time-getting client and time server pro-gram For workstations needing to synchronize with a local server,there is the small, less complex K9 program as well RegisteringTardis costs $20 and K9 is a mere $6 http://www.kaska.demon.co.uk/

ref-Appendix C330

Trang 19

WiSentry is a LAN-based product that identifies wireless devicesconnected or trying to gain access to your wired LAN Set alarms for intrusions and rogue access points, and then sniff them out withthe Windows CE/PDA version Not yet as feature rich as some intru-sion detection products, it is not limited to using specific WLANadapters nor does it require that there be any wireless devices onyour LAN, as it will tell you if and when they appear.http://www.wimetrics.com

Trang 20

I really wanted to love WLANExpert until I discovered it does notrun on Windows 2000 or XP If you don’t mind running it on Win-dows 98 or Me you’ll be fine, and you may want to so that you canenjoy its features It works with most Intersil Prism2-based WLANcards, covering LinkSys and similar products Two of the best fea-tures are built-in antenna testing and reporting on whether yourattached antenna is good or bad—most useful for external antennaconnections or detecting a broken internal antenna It has a modulethat lets you set the transmit power for your LAN card.http://www.allaboutjake.com/network/linksys/wlanexpert.html

Appendix C332

Trang 21

ZEDu—ZoneEdit Dynamic Update

ZoneEdit Dynamic Update is my tool of choice for updating myZoneEdit DNS services for a couple of the servers I maintain on myresidential DSL service It is simple and effective—which is all youneed to do the job After the 45-day evaluation period you can regis-ter the product for $17.95 through the author ’s Web site.http://glsoft.glewis.com/

Resources for MacintoshMacintosh\APScanner—APScanner for Mac

A tool for detecting the presence of nearby wireless LANs.http://www.packetninja.ca/

Trang 22

Linux Resources

Since the open-source environment is quite dynamic, I chose to notinclude any of the source or binary files or installers on the CD Youshould visit the respective Web site for the program you are interest-

ed in to get the latest files for your configuration After finally ting wireless to work on my Linux system, thanks to files and helpfrom AbsoluteValue Systems and the wlan-ng’contributions, I hadthe pleasure of trying AirSnort, NoCat, and Sputnik successfully andfound them to be all they said they were—effective and useful Ifyou’re a Linux-junkie, dig in!!

get-AbsoluteValue Systems: http://www.linux-wlan.org/

A must-visit site to obtain source code and relevant information tobuild into your Linux system for wireless networking

AirSnort: http://airsnort.shmoo.com/

AirSnort is the most popular tool for grabbing WEP encryption keyinformation from a wireless network It may be of value as part of asecurity analysis but it’s real purpose is to reveal the keys of otherpeople’s wireless LANs

Kismet Packet Sniffer: http://www.kismetwireless.net/

Kismet sniffs data packets present on a wireless network—valuablestuff if you’re into low-level network and data security analysis

NoCat Authentication: http://nocat.net/

NoCat appears to be the choice of gateway and access control grams for many open/community and closed/commercial wireless net-work hotspots It is the foundation for the Sputnik portal program

pro-SOHOWireless LANRoamer: http://www.lanroamer.net/

LANRoamer is another option for creating a wireless networkhotspot similar to the Sputnik project—download the CD-ROMimage file, burn a CD, put the CD in a system with a wireless cardand access to your network or the Internet Instant wireless portalsite

Appendix C334

Trang 23

Sputnik: www.sputnik.com

Want to provide a community network? Get up and running fastwith this CD-ROM–bootable instant portal The software forcesusers of a Sputnik-backed access point to log in to the Sputnik.comserver The service is free, and the web site maintains a list of affili-ated community hotspots

SSIDSniff: http://www.bastard.net/~kos/wifi/

SSIDSniff falls into the same category as WAVE Stumbler; it detectsand identifies other nearby wireless LANs

Trustix Firewall: http://www.trustix.com

Finally, a firewall for the rest of us who are not and do not want to beproficient at IPChains and similar scripts to control what goes in andout of our networks Trustix Firewall is a secure Linux implementa-tion designed to make any x86 system into a firewall appliance, with

a graphical interface for configuring it specifically as a firewall to gobetween your LAN and the Internet or other connections It also pro-vides IPSec VPN services between two systems that have static IPaddresses While there is no specific wireless component to this prod-uct, it treats wireless connections as it would any other Ethernetconnection; it’s a good tool for any network

WAVE Stumbler: http://www.cqure.net/tools08.html

WAVE Stumbler allows you to detect and identify other wireless LANsnearby It is a good tool for doing site surveys, to see who is on whichchannel, and (perhaps with a directional antenna) find other WLANs

WEPCrack: http://sourceforge.net/projects/wepcrack

WEPCrack is designed to prove the ease of breaking the WEP keyencryption scheme It does not sniff for packets; instead you mustacquire packets using the prismdump program to create a file of cap-tured packets and then feed that file into WEPCrack

wlan-ng pages: http://prism2.unixguru.raleigh.nc.us/

A must-visit site to get source code and installable wireless ing files for all that is installable for RedHat Linux and commonwireless devices

Trang 24

This page intentionally left blank.

Trang 25

GLOSSARY

802.11—A family of specifications developed by the Institute of

Elec-trical and Electronics Engineers, Inc (IEEE) for wireless LAN nology 802.11 specifies the radio signal interface between a clientradio and a base station radio, or between two client radios Thereare several specifications in the 802.11 family:

tech-■ 802.11—Wireless LANs providing 1 or 2 Mbps transmission in the

2.4 GHz band, using either frequency hopping spread spectrum(FHSS) or direct sequence spread spectrum (DSSS)

802.11a—A subset of 802.11 that provides an up to 54 Mbps data

rate using the 5 GHz band 802.11a uses an orthogonal frequencydivision multiplexing encoding scheme, rather than FHSS orDSSS

802.11b—(Also known as Wi-Fi or wireless fidelity.) A subset of

802.11 that provides 11 Mbps data rates with the ability to scaleback to 5.5, 2, or 1 Mbps rates, and uses the 2.4 GHz band.802.11b uses the DSSS modulation scheme 802.11b allows Ether-net functionality over radio

802.11c—Relates to 802.11 bridging functions.

802.11f—An interaccess point protocol to help ensure

interoper-ability for roaming access

802.11g—Provides 20+ Mbps in the 2.4 GHz band.

802.11h—A future standard for wireless spectrum management.

802.11i—A standard for enhancing the security of wireless local

area networks (WLANs) Preceded by an interim nonstandard Wi-Fiprotected access (WPA) security enhancement

802.1x—A standard for wireless LAN authentication methods.

Copyright 2003 by The McGraw-Hill Companies, Inc Click Here for Terms of Use.

Trang 26

Access point—A bridge that provides access for wireless stations to

a wired local area network (LAN), and typically onto a wired LAN

Access point (AP)—A wireless network interface device, acting as

or replacing the function of the hub or switch in a wired network, toallow wireless network cards in client systems to connect to a LAN

or the Internet

Access time—The amount of time necessary for data to become

available from a disk drive or memory area after a request is issued

Acknowledge (ACK)—A signal sent by a receiving device

confirm-ing that information sent has been received The opposite of NACK

Ad-Hoc mode—A group of computers with wireless local area

net-work (WLAN) adapters, connected as an independent peer-to-peerWLAN

Adapter—A hardware device, usually a set of connectors and a

cable, used between two pieces of equipment to convert one type ofplug or socket to another, or to convert one type of signal to another.Examples are a 9-to-25 pin serial port adapter cable, a serial-port-to-serial-port null modem, and a PC-printer-interface-to-printer cable

Adapter card—A plug-in card used to exchange signals between the

computer and internal or external equipment such as a parallelprinter or serial ports, video adapters or disk controllers

Add-in card—See adapter card.

Address—A location in memory or on a hardware bus of either a

specific piece of data or a physical hardware device

Advanced configuration and power interface (ACPI)—A

stan-dard specification and method for the monitoring of system activityand control of system configurations with power applied to orremoved from system components, or switched to other components,depending on power states Accommodates different modes of sleep,suspend, and full-on system readiness of many system components

Advanced graphics port (AGP)—A high-performance data bus

designed specifically to handle digital information from a computersystem to a video adapter AGP is a specific enhancement to theperipheral component interconnect (PCI) bus, allowing the videoadapter to directly access main memory

Glossary

338

Ngày đăng: 10/08/2014, 12:21