1. Trang chủ
  2. » Nghệ sĩ và thiết kế

The Wireless LAN

56 5 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 56
Dung lượng 2,3 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

The switch is the point where the client gains access to the network.. • In a wireless LAN, each client uses a wireless adapter to gain access to the.[r]

Trang 1

CCNA – Semester 3

Chapter 7: Basic Wireless

Concepts and Configuration

CCNA Exploration 4.0

Trang 2

Objectives

• Describe the components and operations of basic

wireless LAN topologies

• Describe the components and operations of basic

wireless LAN security

• Configure and verify basic wireless LAN access

• Configure and troubleshoot wireless client access

Trang 3

The Wireless LAN

Trang 4

Why Use Wireless?

• Business networks today are evolving to support people who are on the move

• Mobility environment: where people can take their

connection to the network along with them on the road

• There are many different infrastructures (wired LAN, service provider networks) that allow mobility like this to happen, but

in a business environment, the most important is the WLAN

• People now expect to be connected at any time and place

Trang 5

Wireless Technologies

Trang 6

Wireless LAN

Trang 7

Comparing a WLAN to a LAN

• In an 802.3 Ethernet LAN, each client has

a cable that connects the client NIC to a

switch The switch is the point where the

client gains access to the network

• In a wireless LAN, each client uses a

wireless adapter to gain access to the

network through a wireless device such as

a wireless router or access point

Trang 8

Wireless standards

Trang 9

Wireless Infrastructure Components

Trang 11

802.11 Topologies: Ad hoc Network

Trang 12

802.11 Topologies: Basic Service Sets

Trang 13

802.11 Topologies: Extended Service

Sets

Trang 14

Client and Access Point Association

• Beacon

Trang 15

Client and Access Point Association

Trang 16

Client and Access Point Association

Step 3 - 802.11 Association

Trang 17

Planning the Wireless LAN

Trang 18

Planning the Wireless LAN

Trang 19

Planning the Wireless LAN

Trang 20

Planning the Wireless LAN

Trang 21

Wireless LAN Security

Trang 22

Wireless LAN Security Threats

Unauthorized Access

Trang 23

Wireless LAN Security Threats

Trang 24

Wireless LAN Security Threats

 Denial of Service

Trang 25

Wireless Security Protocols

Trang 26

Wireless Security Protocols

Trang 27

Wireless Security Protocols

Trang 28

Wireless Security Protocols

• Encryption

Trang 29

Securing a Wireless LAN

Trang 30

Configure Wireless LAN Access

Trang 31

Configuring the Wireless Access Point

Trang 32

Setup: Basic Setup

Trang 33

Administration: Management

Trang 34

Configuring Basic Wireless Settings

Trang 35

Security Mode

• Select the mode you want to use: PSK-Personal,

PSK2-Personal, PSK-Enterprise, PSK2-Enterprise, RADIUS, or

WEP

Trang 36

Mode Parameters

Enterprise modes are not configured in this chapter

Trang 37

Configure Encryption and Key

Trang 38

Configure a wireless NIC: Scan SSID

Trang 39

Configure a wireless NIC: Scan SSID

Trang 40

Select the Wireless Security Protocol

• Practice: 7.3.2.4

Trang 41

Troubleshooting

Simple WLAN Problems

Trang 42

• Step 2 - Confirm the physical status of WLAN devices.

• Step 3 - Inspect wired links

Trang 43

Updating the Access Point Firmware

Trang 44

Incorrect Channel Settings

Trang 45

Incorrect Channel Settings: Solution

Trang 46

Solving RF Interference

Trang 47

Solving RF Interference

• Site Surveys

Trang 48

Site Survey

• Two categories: Manual and utility assisted

• Manual site surveys can include a site evaluation to be

followed by a more thorough utility-assisted site survey A site evaluation involves inspecting the area with the goal of identifying potential issues that could impact the network

Specifically, look for the presence of multiple WLANs,

unique building structures, such as open floors and

atriums, and high client usage variances, such as those

caused by differences in day or night shift staffing levels

Note: you do not conduct site surveys as part of this course

Trang 49

Access Point Misplacement

Trang 50

Access Point Misplacement: Solution

Trang 51

Access Point Misplacement: Solution

• Ensure that access points are not mounted closer than 7.9 inches (20 cm) from the body of all persons.

• Do not mount the access point within 3 feet (91.4 cm) of metal

• Do not mount the access point outside of buildings.

• Do not mount the access point on building perimeter walls, unless

outside coverage is desired.

• When mounting an access point in the corner of a right-angle hallway intersection, mount it at a 45-degree angle to the two hallways The

access point internal antennas are not omnidirectional and cover a

larger area when mounted this way.

Trang 52

Problems with Authentication and Encrytion

Trang 53

Problems with Authentication and Encrytion

Trang 54

Problems with Authentication and Encrytion

Trang 55

Summary

Trang 56

56

Ngày đăng: 16/12/2020, 13:57

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w