You are on page 1of 31

Chapter 7 Wireless Tecnology

CCNA Discovery 4.0

PDF created with pdfFactory trial version www.pdffactory.com

Objectives

Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless LAN security issues and mitigation strategies Configure an integrated wireless access point and a wireless client .

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
Wireless Technology and Devices
Describe the various wireless technologies and the devices that use them

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
Wireless Technology and Devices
Infrare Infrared (IR) is relatively low energy and cannot penetrate through walls or other obstacles It is commonly used to connect and move data between devices such as Personal Digital Assistants (PDAs) and PCs A specialized communication port known as an Infrared Direct Access (IrDA) port uses IR to exchange information between devices R only allows a one-to-one type of connection. It is generally used for short-range, line-of-sight, communications IR is also used for remote control devices, wireless mice, and wireless keyboards

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
Wireless Technology and Devices
Radio Frequency (RF)

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
Benefits and Limitations of Wireless Technology

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
Types of Wireless Networks and Their Boundaries

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
Wireless LAN Standards

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
Wireless LAN Components

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
Wireless LAN Components
Antennas

Used on APs and Wireless bridges Increases the output signal strength from a wireless device Receives wireless signals from other devices such as STAs Increase in signal strength from an antenna is known as the gain Higher gains usually translate into increased transmission distances

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
WLANS and SSID Identify and describe various wireless modes and the importance of the
SSID
IBSS ad hoc BSS - infrastructure

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
WLANS and SSID

Describe how wireless channels are used CSMA/CA: Describe how wireless channels avoid collisions

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
Configuring The Access Point

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Wireless Technology
Configuring the Wireless Clients

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Why people Attack WLANs Describe why and how people attack wireless networks

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Why people Attack WLANs Describe why and how people attack wireless networks

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Why people Attack WLANs Describe why and how people attack wireless networks

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Limiting Access to a WLAN

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Authentication on a WLAN
Open Authentication

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Authentication on a WLAN
Pre-shared keys (PSK)

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Authentication on a WLAN
Extensible Authentication Protocol (EAP)

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Authentication on a WLAN
Example:

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Encryption on a WLAN Wired Equivalency Protocol (WEP)

WEP uses pre-configured keys to encrypt and decrypt data A WEP key is entered as a string of numbers and letters and is generally 64 bits or 128 bits long.

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Encryption on a WLAN Wi-fi Protected Access (WPA)

WPA generates new, dynamic keys each time a client establishes a connection with the AP

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Traffic Filtering on a WLAN Describe traffic filtering and its purpose

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Planning the WLAN Plan for a wireless LAN implementation

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Installing and Securing the AP

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Backing-up and Restoring Configuration Files Describe options for backing-up and restoring AP configurations

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Update Firmware

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Security Considerations on A Wireless LAN


Summary

Wireless technologies use electromagnetic radiation in the form of radio signals to carry information between devices. Ease and convenience of connecting devices wirelessly creates security concerns that need to be addressed. Before installing wireless devices, an installation plan should be created which includes strategies for layout and security.

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

Hc vin cng ngh thng tin Bach Khoa - Website: www.bkacad.com

PDF created with pdfFactory trial version www.pdffactory.com

You might also like