You are on page 1of 29

Configure a Wireless Router

LAN Switching and Wireless Chapter 7

ITE I Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Objectives
Describe the components and operations of basic wireless LAN topologies. Describe the components and operations of basic wireless LAN security. Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Components and Operations of Basic Wireless LAN Topologies


Wireless LANs are a popular choice for small business LAN implementations

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Components and Operations of Basic Wireless LAN Topologies


Wireless LANs are a popular choice for small business LAN implementations

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Components and Operations of Basic Wireless LAN Topologies


Wireless LANs are a popular choice for small business LAN implementations

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Components and Operations of Basic Wireless LAN Topologies


The 802.11 wireless standards

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Components and Operations of Basic Wireless LAN Topologies


The 802.11 wireless standards (source: Wikipedia)

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Components and Operations of Basic Wireless LAN Topologies


The 802.11 wireless standards

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Components and Operations of Basic Wireless LAN Topologies


Components of a 802.11-based wireless infrastructure

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

Components and Operations of Basic Wireless LAN Topologies


Wireless Access Points:

Connect wireless clients to the wired LAN Converts packets from their 802.11 to 802.3 frame encapsulation Layer 2 device acting as an 802.3 hub
Shared medium Half duplex

Avoids collisions (CSMA/CA)


Request to send (RTS) Clear to send (CTS)

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

10

Components and Operations of Basic Wireless LAN Topologies


Wireless networks operation: hidden node

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

11

Components and Operations of Basic Wireless LAN Topologies


Wireless operation: modes, SSID (service set identifier)

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

12

Components and Operations of Basic Wireless LAN Topologies


Wireless networks operation: channel

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

13

Components and Operations of Basic Wireless LAN Topologies


Wireless networks operation: topologies
Independent Basic Service set: no AP Basic Service set: one AP Extended Service set: many APs

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

14

Components and Operations of Basic Wireless LAN Topologies


Wireless networks operation: client-AP association

Discovering a WLAN
Beacons Probes

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

15

Components and Operations of Basic Wireless LAN Topologies


Wireless networks operation: client-AP association
Authentication Association

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

16

Components and Operations of Basic Wireless LAN Topologies


Planning a wireless LAN:

Common Distribution System provides roaming


Multiple APs appear as a single BSS A common SSID 10-15% overlap between cells Non-overlaping channels

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

17

Components and Operations of Basic Wireless LAN Security


Threats to wireless LAN security

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

18

Components and Operations of Basic Wireless LAN Security


Wireless Security Protocols

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

19

Components and Operations of Basic Wireless LAN Security


Wireless Security Protocols:

WEP (wired equivalent privacy): deprecated


RC4 stream cipher WEP-40 uses a 40 bit key; WEP-104 uses a 104-bit key Uses CRC-32 checksum for integrity

WPA (Wi-Fi protected access):


Encryption using TKIP (128-bit per-packet key) Replaces CRC with MIT (message integrity check)

WPA2:
Full compliance with IEEE 802.11i AES (advanced encryption standard) WPA2 Personal uses a set-up password WPA2 Enterprise uses a server

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

20

Components and Operations of Basic Wireless LAN Security


Securing a wireless LAN from the key security threats

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

21

Basic Wireless LAN Access


Configure a wireless access point

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

22

Configure and Troubleshoot Wireless Client Access


Solving access point and firmware issues

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

23

Configure and Troubleshoot Wireless Client Access


Solving common RF interference issues

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

24

Configure and Troubleshoot Wireless Client Access


Solving antenna misplacement problems

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

25

Configure and Troubleshoot Wireless Client Access


Solving authentication problems associated with wireless LANs

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

26

Summary
Wireless LANs use standards such as
IEEE 802.11a IEEE 802.11b IEEE 802.11g IEEE 802.11n

Basic Service set


Mobile clients use a single access point for connectivity

Extended service set


Multiple access point that share an SSID

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

27

Summary
WLAN security practices/methods include
MAC address filtering SSID making Implementing WPA2

Configuration of wireless NIC and access point


Configure both of them the same way
SSID

Ensure that the latest firmware is installed

Troubleshooting WLANs include doing the following:


Check channel setting Check for interference

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

28

ITE 1 Chapter 6

2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

29