The switch is the point where the client gains access to the network.. • In a wireless LAN, each client uses a wireless adapter to gain access to the.[r]
Trang 1CCNA – Semester 3
Chapter 7: Basic Wireless
Concepts and Configuration
CCNA Exploration 4.0
Trang 2Objectives
• Describe the components and operations of basic
wireless LAN topologies
• Describe the components and operations of basic
wireless LAN security
• Configure and verify basic wireless LAN access
• Configure and troubleshoot wireless client access
Trang 3The Wireless LAN
Trang 4Why Use Wireless?
• Business networks today are evolving to support people who are on the move
• Mobility environment: where people can take their
connection to the network along with them on the road
• There are many different infrastructures (wired LAN, service provider networks) that allow mobility like this to happen, but
in a business environment, the most important is the WLAN
• People now expect to be connected at any time and place
Trang 5Wireless Technologies
Trang 6Wireless LAN
Trang 7Comparing a WLAN to a LAN
• In an 802.3 Ethernet LAN, each client has
a cable that connects the client NIC to a
switch The switch is the point where the
client gains access to the network
• In a wireless LAN, each client uses a
wireless adapter to gain access to the
network through a wireless device such as
a wireless router or access point
Trang 8Wireless standards
Trang 9Wireless Infrastructure Components
Trang 11802.11 Topologies: Ad hoc Network
Trang 12802.11 Topologies: Basic Service Sets
Trang 13802.11 Topologies: Extended Service
Sets
Trang 14Client and Access Point Association
• Beacon
Trang 15Client and Access Point Association
Trang 16Client and Access Point Association
Step 3 - 802.11 Association
Trang 17Planning the Wireless LAN
Trang 18Planning the Wireless LAN
Trang 19Planning the Wireless LAN
Trang 20Planning the Wireless LAN
Trang 21Wireless LAN Security
Trang 22Wireless LAN Security Threats
Unauthorized Access
Trang 23Wireless LAN Security Threats
Trang 24Wireless LAN Security Threats
Denial of Service
Trang 25Wireless Security Protocols
Trang 26Wireless Security Protocols
Trang 27Wireless Security Protocols
Trang 28Wireless Security Protocols
• Encryption
Trang 29Securing a Wireless LAN
Trang 30Configure Wireless LAN Access
Trang 31Configuring the Wireless Access Point
Trang 32Setup: Basic Setup
Trang 33Administration: Management
Trang 34Configuring Basic Wireless Settings
Trang 35Security Mode
• Select the mode you want to use: PSK-Personal,
PSK2-Personal, PSK-Enterprise, PSK2-Enterprise, RADIUS, or
WEP
Trang 36Mode Parameters
• Enterprise modes are not configured in this chapter
Trang 37Configure Encryption and Key
Trang 38Configure a wireless NIC: Scan SSID
Trang 39Configure a wireless NIC: Scan SSID
Trang 40Select the Wireless Security Protocol
• Practice: 7.3.2.4
Trang 41Troubleshooting
Simple WLAN Problems
Trang 42• Step 2 - Confirm the physical status of WLAN devices.
• Step 3 - Inspect wired links
Trang 43Updating the Access Point Firmware
Trang 44Incorrect Channel Settings
Trang 45Incorrect Channel Settings: Solution
Trang 46Solving RF Interference
Trang 47Solving RF Interference
• Site Surveys
Trang 48Site Survey
• Two categories: Manual and utility assisted
• Manual site surveys can include a site evaluation to be
followed by a more thorough utility-assisted site survey A site evaluation involves inspecting the area with the goal of identifying potential issues that could impact the network
Specifically, look for the presence of multiple WLANs,
unique building structures, such as open floors and
atriums, and high client usage variances, such as those
caused by differences in day or night shift staffing levels
• Note: you do not conduct site surveys as part of this course
Trang 49Access Point Misplacement
Trang 50Access Point Misplacement: Solution
Trang 51Access Point Misplacement: Solution
• Ensure that access points are not mounted closer than 7.9 inches (20 cm) from the body of all persons.
• Do not mount the access point within 3 feet (91.4 cm) of metal
• Do not mount the access point outside of buildings.
• Do not mount the access point on building perimeter walls, unless
outside coverage is desired.
• When mounting an access point in the corner of a right-angle hallway intersection, mount it at a 45-degree angle to the two hallways The
access point internal antennas are not omnidirectional and cover a
larger area when mounted this way.
Trang 52Problems with Authentication and Encrytion
Trang 53Problems with Authentication and Encrytion
Trang 54Problems with Authentication and Encrytion
Trang 55Summary
Trang 5656