You are on page 1of 58

Configure a Wireless Router

LAN Switching and Wireless Chapter 7

ITE I Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Objectives
Describe the components and operations of basic wireless LAN topologies. Describe the components and operations of basic wireless LAN security. Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Basic Wireless LAN Topologies

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Wireless vs Ethernet

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Similarities Between WLAN and LAN


A wireless LAN is an 802 LAN. Transmits data over the air vs. data over the wire Looks like a wired network to the user Defines physical and data link layer Uses MAC addresses The same protocols/applications run over both WLANs and LANs. IP (network layer) IPSec VPNs (IP-based) Web, FTP, SNMP (applications)
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

Differences Between WLAN and LAN


WLANs use radio waves as the physical layer.
WLANs use CSMA/CA instead of CSMA/CD to access the network

Radio waves have problems that are not found on wires.


Connectivity issues Coverage problems Multipath issues Interference, noise Privacy issues

WLANs use mobile clients.


No physical connection Battery-powered

WLANs must meet country-specific RF regulations.


ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

More on CSMA/CA
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
The wireless 802.11 standard uses CSMA/CA or "collision avoidance." The method is used because the wireless stations have no way to detect collisions WHILE sending. Attempts to avoid collisions rather than detect them

How it works:
Transmitting device listens to the network (senses the carrier) and waits for it to be free Device then waits a random period of time and transmits. If the receiver gets the frame intact, it sends back an ACK to the sender. If no ACK is received, the message is re-transmitted. If the channel is not clear, the node waits for a randomly chosen period of time (backoff factor), and then checks again to see if the channel is clear.
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

802.11 wireless standards

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Components and Operations of Basic Wireless LAN Topologies

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Setting Up A Wireless Network

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

10

Basic Service Set (BSS) - Infrastructure

Access Points An access point (AP) is a WLAN device that can act as the center point of a stand-alone wireless network. An AP can also be used as the connection point between wireless and wired networks. In large installations, the roaming functionality provided by multiple APs allows wireless users to move freely throughout the facility, while maintaining seamless, uninterrupted access to the network.
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

11

Independent Basic Service Set (IBSS) Ad-Hoc

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

12

Extended Infrastructure ESS


2 or more BSSs that are connected by a common distribution system Allows the creation of a wireless network of arbitrary size and complexity. All packets in an ESS must go through one of the APs.

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

13

The 802.11 Join Process


Stage 1 - Probing Stage 2 Authentication Stage 3 Assosiation

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

14

How to plan a wireless LAN

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

15

Channel Setup

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

16

Access point coverage & comparison


As a client moves away from the AP, the transmission signals between the client and AP weaken. Rather than decreasing reliability, the AP shifts to a slower data rate, which gives more accurate data transfer. This is called data rate or multi-rate shifting. This happens without losing the connection, and without any interaction from the user.

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

17

Rate Shifting

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

18

Unlicensed Frequency Bands

ISM: Industry, Scientific, and Medical frequency band No license required


ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

No exclusive use Best effort Interference possible


19

Radio Frequency Transmission


Radio frequencies are radiated into the air via an antenna, creating radio waves. Radio waves are absorbed when they are propagated through objects (e.g. walls). Radio waves are reflected by objects (e.g. metal surfaces). This absorption and reflection can cause areas of low signal strength or low signal quality.

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

20

Radio Frequency Transmission


Higher data rates have a shorter transmission range. The receiver needs more signal strength and better SNR to retrieve information. Higher transmit power results in greater distance. Higher frequencies allow higher data rates. Higher frequencies have a shorter transmission range.

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

21

802.11b

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

22

802.11b Standard
Standard was ratified in September 1999 Operates in the 2.4-GHz band Specifies Direct Sequence Spread Spectrum (DSSS) Specifies four data rates up to 11 Mbps 1, 2, 5.5, 11 Mbps Provides specifications for vendor interoperability (over the air) Defines basic security, encryption, and authentication for the wireless link Is the most commonly deployed wireless LAN standard
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

23

2.4-GHz Channels
Channel Channel Center Channel Frequency Identifier Frequency Range [MHz] Regulatory Domain Americas Europe, Middle East, and Asia X X X X X X X X X X X X X Japan

1 2 3 4 5 6 7 8 9 10 11 12 13
ITE 1 Chapter 6

2412 MHz 2417 MHz 2422 MHz 2427 MHz 2432 MHz 2437 MHz 2442 MHz 2447 MHz 2452 MHz 2457 MHz 2462 MHz 2467 MHz 2472 MHz

2401 2423 2406 2428 2411 2433 2416 2438 2421 2443 2426 2448 2431 2453 2436 2458 2441 2463 2446 2468 2451 2473 2466 2478 2471 2483 2473 2495 Cisco Public

X X X X X X X X X X X

X X X X X X X X X X X X X X
24

14 2006 Cisco Systems, Inc. AllMHz 2484 rights reserved.

2.4-GHz Channel Use

Each channel is 22 MHz wide. North America: 11 channels Europe: 13 channels There are three nonoverlapping channels: 1, 6, 11. Using any other channels will cause interference. Three access points can occupy the same area.
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

25

802.11b/g (2.4 GHz) Channel Reuse

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

26

802.11b Access Point Coverage

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

27

802.11a

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

28

802.11a Standard
Standard was ratified September 1999 Operates in the 5-GHz band Uses orthogonal frequency-division multiplexing (OFDM) Uses eight data rates of up to 54 Mbps 6, 9, 12, 18, 24, 36, 48, 54 Mbps Has from 12 to 23 nonoverlapping channels (FCC) Has up to 19 nonoverlapping channels (ETSI) Regulations different across countries Transmit (Tx) power control and dynamic frequency selection required (802.11h)
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

29

IEEE 802.11h Spectrum Management


Primary use of 5 GHz bands outdoors is radar in many countries. 802.11h is an addition to the 802.11 family of standards. 802.11h rules are designed to minimize interference. Uses Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC). Radios must comply to benefit from 11 new channels.

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

30

802.11a Channel Reuse


802.11h DFS not available
Manual channel assignment required

802.11h DFS implemented


Channel assignment done by Dynamic Frequency Selection (DFS) Only frequency bands can be selected

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

31

802.11g

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

32

802.11g Standard
Standard was ratified June 2003 Operates in the 2.4-GHz band as 802.11b Same three nonoverlapping channels: 1, 6, 11 DSSS (CCK) and OFDM transmission 12 data rates of up to 54 Mbps 1, 2, 5.5, 11 Mbps (DSSS / 802.11b) 6, 9, 12, 18, 24, 36, 48, 54 Mbps (OFDM)
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

33

802.11g Protection Mechanism


Problem: 802.11b stations cannot decode 802.11g radio signals. 802.11b/g AP communicates with 802.11b clients with max. 11 Mbps. 802.11b/g AP communicates with 802.11g clients with max. 54 Mbps. 802.11b/g AP activates RTS/CTS to avoid collisions when 802.11b clients are present. Additonal overhead reduces throughput.

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

34

Self Check
1. What are the 3 non-overlapping channels available in 802.11b/g? 2. Which standards operate in the 2.4-GHz band? 3. What frequency band does 802.11a operate in? 4. Which standards offer data rates of up to 54Mbps? 5. What is data rate shifting?

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

35

802.11 Standards Comparison

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

36

802.11 RF Comparison
802.11b 2.4 GHz
Most commonly deployed WLAN standard

802.11g 2.4 GHz


Higher throughput OFDM technology reduces multipath issues

802.11a 5 GHz
Highest throughput OFDM technology reduces multipath issues Provides up to 23 nonoverlapping channels

ITE 1 Chapter 6

Pro Con

Interference and noise from other services in the 2.4-GHz band

Interference and noise Lower market from other services in penetration the 2.4GHz band

Only 3 nonoverlapping Only 3 nonoverlapping channels channels Distance limited by multipath issues Throughput degraded in the presence of 802.11b clients
Cisco Public

2006 Cisco Systems, Inc. All rights reserved.

37

802.11 Standards Comparison


802.11b Ratified Frequency band No of nonoverlapping channels Transmission Data rates [Mbps] Throughput [Mbps]
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

802.11g 2003 2.4 GHz 3

802.11a 1999 5 GHz Up to 23

1999 2.4 GHz 3

DSSS

DSSS

OFDM

OFDM

1, 2, 5.5, 11 1, 2, 5.5, 11 6, 9, 12, 18, 24, 6, 9, 12, 18, 24, 36, 48, 54 36, 48, 54 Up to 6 Up to 22 Up to 28

38

Threats to wireless LAN security

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

39

Wireless LAN Security

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

40

WLAN Security Hierarchy


Enhanced Security Basic Security Open Access

No Encryption, Basic Authentication

40-bit or 128-bit Static WEP Encryption

802.1x, TKIP/WPA Encryption, Mutual Authentication, Scalable Key Mgmt., etc.


Business

Public Hotspots

Home Use Business Traveler, Telecommuter

Remote Access
ITE 1 Chapter 6

Virtual Private Network (VPN)

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

41

WEP

WEP is a key. WEP scrambles communications between AP and client. AP and client must use same WEP keys. WEP keys encrypt unicast and multicast. WEP is easily attacked

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

42

WPA

Interoperable, Enterprise-Class Security


ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

43

Authenticating with EAP

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

44

Extensible Authentication Protocol (802.1x authentication) Provides dynamic WEP keys to user devices. Dynamic is more secure, since it changes. Harder for intruders to hackby the time they have performed the calculation to learn the key, they key has changed!

EAP

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

45

Wireless Encryption

Two primary functions: It encrypts the Layer 2 payload It carries out a message integrity check (MIC) in the encrypted packet. This helps ensure against a message being tampered with.
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

46

How to secure a wireless LAN from the key security threats

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

47

Configure a wireless access point

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

48

Configure a wireless NIC

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

49

Configure and Troubleshoot Wireless Client Access

Step 1 - Eliminate the user PC as the source of the problem.


Confirm the network configuration on the PC using the ipconfig command. Verify that the PC has received an IP address. Confirm that the device can connect to the wired network.. It may be necessary to try a different wireless NIC. If the wireless NIC of the client is working, check the security mode and encryption settings on the client. If the security settings do not match, the client cannot get access to the WLAN.

Step 2 - Confirm the physical status of devices.


Are all the devices actually in place? Consider a possible physical security issue. Is there power to all devices, and are they powered on? (You will check for inline power in Step 4.)

Step 3 - Inspect links.


Inspect links between cabled devices looking for bad connectors or damaged or missing cables. If the physical plant is in place, use the wired LAN to see if you can ping devices including the access point.
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

50

How to solve incorrect channel settings

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

51

Solve common RF interference issues

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

52

Correct antenna placement

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

53

Authentication problems

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

54

Summary
Wireless LANs use standards such as IEEE 802.11a IEEE 802.11b IEEE 802.11g IEEE 802.11n Basic Service set
Mobile clients use a single access point for connectivity

Extended service set


Multiple access point that share an SSID

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

55

Summary
WLAN security practices/methods include
MAC address filtering SSID making Implementing WPA2

Configuration of wireless NIC and access point


Configure both of them the same way SSID Ensure that the latest firmware is installed

Troubleshooting WLANs include doing the following:


Check channel setting Check for interference

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

56

Resources
For fee 802 standards http://standards.ieee.org (for fee) Free 802 standards http://standards.ieee.org/getieee802/ (Standards are available six months after release for free) LWAPP http://www.ietf.org/html.charters/capwap-charter.html Mobile Ad-Hoc Networks (MANET) http://www.ietf.org/html.charters/manet-charter.html Wireless LAN Compatibility Association http://www.wi-fi.org
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public

57

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

58

You might also like