Difference between revisions of "CCNA Explorer 3 Basic Wireless Concepts and Configuration"

From Teknologisk videncenter
Jump to: navigation, search
m
m (Wireless Security Protocols)
Line 95: Line 95:
 
|[[Image:ScreenShot249.jpg|800px|left|thumb|Wireless Security Protocols]]
 
|[[Image:ScreenShot249.jpg|800px|left|thumb|Wireless Security Protocols]]
 
|-
 
|-
|7.2.2
+
|[[Image:ScreenShot250.jpg|800px|left|thumb|Wireless Association]]
 +
|-
 +
|[[Image:ScreenShot251.jpg|800px|left|thumb|EAP]]
 +
|-
 +
|[[Image:ScreenShot252.jpg|800px|left|thumb|TKIP and AES]]
 +
|-
 +
|[[Image:ScreenShot252.jpg|800px|left|thumb|TKIP and AES]]
 +
|-
 +
|
 +
===Securing a Wireless LAN===
 +
{|
 +
|[[Image:ScreenShot253.jpg|800px|left|thumb|Controlling Access to the Wireless LAN]]
 +
|-
 +
|
 +
==Configuring Wireless LAN Access==
 +
===Configuring the Wireless Access Point===
 +
{|
 +
|[[Image:ScreenShot254.jpg|800px|left|thumb|Configuration Steps]]
 +
|-
 +
|[[Image:ScreenShot255.jpg|800px|left|thumb|Setup]]
 +
|-
 +
|[[Image:ScreenShot256.jpg|800px|left|thumb|Management]]
 +
|-
 +
|[[Image:ScreenShot257.jpg|800px|left|thumb|Wireless]]
 +
|-
 +
|[[Image:ScreenShot258.jpg|800px|left|thumb|Configuration overview]]
 +
|-
 +
|[[Image:ScreenShot259.jpg|800px|left|thumb|Configure mode]]
 +
|-
 +
|[[Image:ScreenShot260.jpg|800px|left|thumb|Configure SSID]]
 +
|-
 +
|[[Image:ScreenShot261.jpg|800px|left|thumb|Confiugre Radio Band]]
 +
|-
 +
|[[Image:ScreenShot262.jpg|800px|left|thumb|Configure Wide Channel]]
 +
|-
 +
|[[Image:ScreenShot263.jpg|800px|left|thumb|Configure standard channel]]
 +
|-
 +
|[[Image:ScreenShot264.jpg|800px|left|thumb|Wireless Security - Overview]]
 +
|-
 +
|[[Image:ScreenShot265.jpg|800px|left|thumb|Wireless Security - Mode]]
 +
|-
 +
|[[Image:ScreenShot266.jpg|800px|left|thumb|Wireless Security - Mode Parameters]]
 +
|-
 +
|[[Image:ScreenShot267.jpg|800px|left|thumb|Wireless Security - Encryption]]
 +
|-
 +
|[[Image:ScreenShot268.jpg|800px|left|thumb|Wireless Security - Key]]
 +
|-
 +
|
 +
===Configuring Wireless NIC===

Revision as of 13:01, 26 August 2010

Basic Wireless Concepts and Configuration

The Wireless LAN

Why Use Wireless?

Wireless Techonologies
Wireless LANs
WLAN vs. LAN
WLAN Devices
Clients

Wireless LAN Standards

WLAN Graph
WLAN Table
Wi-Fi Certifications
  • ITU-R regulates allocation of RF bands.
  • IEEE specifies how RF is modulated to carry information.
  • Wi-Fi ensures that vendors make devices that are interoperable.

Wireless Infratructure Components

Wireless NICs
Wireless Access Points
Hidden Nodes

CSMA/CA - Carrier Sense Multiple Access with Collision Avoidance
(RTS/CTS) - CSMA/CA feature called request to send/clear to send

Wireless Routers

Wireless Operation

Configure Wireless AP
Wireless modes
SSID
Channels
Ad Hoc Networks
Basic Service Set
Extended Service Set
Wireless Beacon
Wireless Probe
Wireless Authentication
Wireless Association

Planning the Wireless LAN

Map
Coverage Area
Align Coverage Areas
Plan

WIreles LAN Security

Threats to Wireless Security

Unauthorized Access
MITM
Denial of Service 1
Denial of Service 2

Wireless Security Protocols

Wireless Security Protocols
Wireless Association
EAP
TKIP and AES
TKIP and AES

Securing a Wireless LAN

Controlling Access to the Wireless LAN

Configuring Wireless LAN Access

Configuring the Wireless Access Point

Configuration Steps
Setup
Management
Wireless
Configuration overview
Configure mode
Configure SSID
Confiugre Radio Band
Configure Wide Channel
Configure standard channel
Wireless Security - Overview
Wireless Security - Mode
Wireless Security - Mode Parameters
Wireless Security - Encryption
Wireless Security - Key

Configuring Wireless NIC