Professional Documents
Culture Documents
Router
ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
Describe the components and operations of basic
wireless LAN topologies.
Describe the components and operations of basic
wireless LAN security.
Configure and verify basic wireless LAN access.
Configure and troubleshoot wireless client access.
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Explain the Components and Operations
of Basic Wireless LAN Topologies
Describe why wireless LANs are a popular choice for
small business LAN implementations
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Explain the Components and Operations
of Basic Wireless LAN Topologies
Describe the 802.11 wireless standards
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Explain the Components and Operations
of Basic Wireless LAN Topologies
Describe the components of a 802.11-based wireless
infrastructure
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Explain the Components and Operations
of Basic Wireless LAN Topologies
Describe how wireless networks operate
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Explain the Components and Operations
of Basic Wireless LAN Topologies
Describe how to plan a wireless LAN
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Explain the Components and Operations
of Basic Wireless LAN Security
Describe the threats to wireless LAN security
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Explain the Components and Operations
of Basic Wireless LAN Security
Describe the wireless protocols. The description will
include a description of 802.1x, a comparison of WPA
and WPA2 as well as comparison of TKIP and AES
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Explain the Components and Operations
of Basic Wireless LAN Security
Describe how to secure a wireless LAN from the key
security threats
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Configure and Verify Basic Wireless LAN
Access
Configure a wireless access point
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Configure and Verify Basic Wireless LAN
Access
Configure a wireless NIC
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Configure and Troubleshoot Wireless
Client Access
Describe how to solve access point firmware issues
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Configure and Troubleshoot Wireless
Client Access
Describe how to solve incorrect channel settings
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Configure and Troubleshoot Wireless
Client Access
Describe how to solve common RF interference issues
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Configure and Troubleshoot Wireless
Client Access
Describe how to correct antenna misplacement
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Configure and Troubleshoot Wireless
Client Access
Describe how to solve the common problems
associated with wireless LAN encryption types
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Configure and Troubleshoot Wireless
Client Access
Describe how to solve authentication problems
associated with wireless LANs
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Summary
Wireless LANs use standards such as
IEEE 802.11a
IEEE 802.11b
IEEE 802.11g
IEEE 802.11n
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Summary
WLAN security practices/methods include
–MAC address filtering
–SSID making
–Implementing WPA2
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21