802.11b Access Point and Device Point Technical training.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Application Guide For Mesh AP – MAP-3120
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Allied Telesyn Wireless LAN Solutions AT-WL2411 Access Point AT-WR2411 Wireless LAN PCMCIA Card.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
802.11b Access Point and Device Point Technical training.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Chapter 9 Connecting to and Setting up a Network
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Design Wireless Network 2
802.11b Access Point and Device Point Technical training.
Mesh Network Technical Guide for the Mesh AP Topic 2 Installation Knowledge / Network Design Copyright © PLANET Technology.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
750Mbps ac Wireless Broadband Router WDRT-750AC.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
Module 6.6 Networking. Internet Connectivity By default, new computers typically come with the network cards installed, the proper drivers installed,
Wireless Networking 102.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
DWR-113 FAQ’s 3G WiFi Router.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Ch. 5 – Access Points. Overview Access Point Connection.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
1 Chapter Overview Wireless Technologies Wireless Security.
1999 Cabletron Systems. Wireless Networking RoamAbout Introduction to Wireless Networking Overview of the Wireless functionality Applications for Wireless.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Presented by: Dr. Munam Ali Shah
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
IEEE Wireless LAN Standard
ICT Unit 4: Network and the effects of using them
INTRODUCTION WIRELESS GATEWAY.  A device that allows a computer and other Internet-enabled devices to access the Internet connection.  Functioned as.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Last updated: 20 April 2006 Alberto Escudero Pascaul ItrainOnline MMTK Access Point Configuration Developed by IT +46 Based on the.
Wireless Ethernet Programming
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
802.11b Wireless Access Point
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

b Access Point and Device Point Technical training

Agenda  System Overview  Marketing information  WLAN Technology  Security  b Access point  b Device Point  Hands on Training

System Overview

The b Access Point is connected on the main network. The Camera is connected to the b Device Point.

System Overview Access Point Wired Network Device Point Internet Device Point

*Today only one device can be connected to the Device Point through the network interface but a future SW-release will (probably) contain multiple device support. This is not a big issue in our customers cases. Our customers will probably only connect one camera to each Device Point. Future overview

Access Point Wired Network Device Point Wired Network Internet Multi-Client Support (will probably be available) Device Point

How to connect the b Access Point  Connect the b Access Point on the main network.  Configure the b Access Point from a computer on the main network (Smart AP utility)  Configure the network parameters and the Security- settings.

How to connect the Camera to the b Device Point  Use a cross over connected UTP Ethernet cable to connect the Camera Server to the Device Point.  The b Device Point is a bridge (converter) between cabled Ethernet and wireless Ethernet (IEEE b).  Today only one camera can be connected to each Device Point.

Marketing information

802.11b Wireless Device Point

Main messaging Unleash your video surveillance cameras with Device Points from Axis! Make your move from wired to wireless surveillance!

Features and benefits  The b Wireless Device Point allows Axis network video products to integrate into new and existing WLAN infrastructures  Eliminates the need for network cabling within network video solutions—lowering both the cost and complexity of the installation  Mobility. Wireless capability enables easy relocation of complete surveillance/monitoring systems  Fully compatible with b Access Points from Axis

Features and benefits (cont.)  Supports 128-bit WEP encryption for reduced risk of unauthorized video access  Platform independent with no special driver software required  Dual antenna design ensures optimal RF performance  Range: 100m (los) with reduced bandwidth  Range: 30 m (los) with full bandwidth

Key Applications  All traditional camera video applications are applicable; the key feature of b Wireless Device Point is to remove the need of network cabling.  Public transportation – wireless capability enables surveillance in hard to reach spots  Building security – allows for surveillance in older buildings without the need for extensive rewiring of the building infrastructure.

Key Applications (cont)  Surveillance of shopping centers and malls – wireless capability enables surveillance in hard to reach spots  Marketing – Broadcasting, cameras can watch otherwise unreachable points of interests  Industrial process monitoring – wireless capability enables surveillance in hard to reach spots  Monitoring of events (as example trade shows, concerts etc.) - wireless capability enables easy reallocation of the complete system)

Bundles  The b Wireless DevicePoint will be bundled with the following products:  AXIS 2100 Network Camera  AXIS 2120 Network Camera  AXIS 2130/2130R Network PTZ Camera

EMEA Pricing Product Name List Price b Device Point169 € AXIS 2100 Wireless Bundle499 € AXIS 2120 Wireless Bundle1349 € AXIS 2130/2130R PTZ Wireless Bundle1845 €

US Pricing Product Name List Price b Device Point169 $ AXIS 2100 Wireless Bundle399 $ AXIS 2120 Wireless Bundle1049 $ AXIS 2130/2130R PTZ Wireless Bundle1799 $

Important  The product has a radio type approval to be sold in the following countries:  Austria, Belgium, Denmark, Finland, France, Germany, Ireland, Italy, Luxembourg, the Netherlands, Norway, Portugal, Spain, Sweden, Switzerland, USA and the United Kingdom.  It cannot be sold outside these countries for legal reasons.

802.11b Wireless Access Point

Main messaging Unleash your video surveillance cameras and network printing with b Wireless Access Points from Axis! Make your move from wired to wireless networks

Features and benefits  Provides an easy and flexible approach towards developing a variety of wireless applications  Facilitates wireless network video installations that can be viewed from anywhere, and complete wireless printing solutions together with the AXIS 5900 Print Server  Fully compatible with b Device Points from Axis  Provides 128-bit WEP encryption, mac-address filtering and hidden accesspoint for added security  Dual antenna design ensures optimal RF performance

US Pricing Product Name List Price b Access Point169 $

EMEA Pricing Product Name List Price b Access Point169 €

Important  The product has a radio type approval to be sold in the following countries:  Austria, Belgium, Denmark, Finland, France, Germany, Ireland, Italy, Luxembourg, the Netherlands, Norway, Portugal, Spain, Sweden, Switzerland, USA and the United Kingdom.  It cannot be sold outside these countries for legal reasons.

Wireless LAN Technologies Overview

 Channel ─ The medium use for passing data in specific frequency, such as 2.4GHz.  BSS (Basic Service Set):  The conceptual area within which members of a basic service set may communicate  Infrastructure mode  ESS (Extended Service Set):  A set of one or more interconnected BSSs and integrated WLANs.  Infrastructure mode  IBSS (Independent BSS) ─ Ad-Hoc mode Authentication  Association  Wired Equivalent Privacy (WEP)  Wireless Distribution System (WDS)  The whole interconnected Wireless LAN, including the different cells, their respective Access Points and the Distribution System Network Definitions

Infrastructure-BSS  BSS/ESS uses infrastructure mode. Wired Network Access Point Client Basic Service Set – single cell

Infrastructure-ESS Wired Network Access Point Client Access Point Client

Ad-Hoc (IBSS)  IBSS uses Ad- Hoc mode

How to Join the Infrastructure Network Wired Network Access Point Client ID : SanDisk1 Channel 7 Open system w/o WEP Searching Auth. Assoc. Connected

 Synchronization  Searching target wireless networks  Active Scanning (STA probes a frame)  Passive Scanning (STA waits for a Beacon) – XI-815  The Authentication Process  To get authenticated from the target wireless network  The Association Process  A state where a client is allowed to pass data through an AP  Additional Authentication(802.1x)  Exchange the ID & Password with RADIUS server How to Join Infrastructure Network

Roaming

Inter-cell Roaming

The Unlicensed Radio Frequency Spectrum GHz IEEE a HiperLAN/2

Physical Layer a802.11g802.11b Standard Approved September 1999 Available Bandwidth 300MHz 83.5MHz Unlicensed Frequencies of Operation GHz GHz GHz Number of Non- overlapping Channels 4(Indoor) 4(Indoor/Outdoor) 3(Indoor/Outdoor) Data Rate Per Channel 6,9,12,18,24,36,48,54 Mbps 1,2,5.5,11 6,9,12,18,22,24,33,36,48,54Mbps 1,2,5.5,11Mbps ModulationOFDM DSSS,OFDM PBCC(O),CCK-OFDM(O) DSSS CCK

Channel Plan – /11b/11g

Non-overlapping channels Channel Spacing (5MHz)

 Channel Plan : {1,6,11} or {…}  Hidden notes interfere Co-Channel Interference

 Sources of interference in 2.4GHz band  Main Source: consumer microwave ovens – Spread Spectrum Receiver design allows narrowband interference – Rate reduction allows even more robust operation  Other radios – RFID tag ( radio frequency ID tag ) – Generally, various systems in the 2.4GHz and will interfere with each other  Bluetooth, IEEE and Home RF are currently imcompatible and will interfere  IEEE and Home RF interoperability is currently being evaluated by Home RF working group Robust for Interference

Security

Why Security is so important?  Privacy  Preventing Unauthorized Access  Information security (read only/fully authorized)  Preventing Attacks  Virus  Personal Security Policy  Networking Security Policy  Tunnel  Firewall

How to protect your network?  Use virus protection software  Use firewall  Set up personal and group firewall.  Do not open unknown attachments  Do not run programs of unknown origin  Disable hidden filename extensions  Keep all applications (including your operating system) patched  Turn off your computer or disconnect from the network when not in use  Disable Java, JavaScript, and ActiveX if possible  Disable scripting features in programs  Make regular backups of critical data  Make a boot disk in case your computer is damaged or compromised

 SSID (Wireless network name)  Authentication  MAC address Control  WEP-keys Security in the b

However…  Wireless Network Vulnerability  2.4GHz radio signal and unlicensed band  Broadcasting all the time  WEP Encryption has been broken by certain means, it is not secure any more.  Authentication process is not strong enough since WEP encryption has been defeated.

Recommendation 1  More secure with WEP on than with WEP off.  The wireless link between the AP and client is only one small part of a secure network.  Large companies should implement end-to-end security  VPN, RADIUS, IEEE 802.1x  Home and small business can take several measures to improve security until a solution is available

Recommendation 2  Turn WEP on and manage your WEP key by changing the default key  Changing the WEP key, daily to weekly.  Password protect drives and folders.  Change the default SSID (Wireless Network Name).  Use MAC address control.  Use a VPN system. Though it would require a VPN server, the VPN client is already included in many operating systems such as Windows 98 Second Edition, Windows 2000 and Windows XP.

802.11b Access Point

 Solution  Atmel (Z-Com)  Power Supply - 5V  LAN Port  One 10Base RJ-45 LAN port – a cross Ethernet cable is included  Antenna Design  One Dipole and one PIFA Hardware Overview

PWRGreenPower enabled WLAN Green Flashing: Wireless LAN traffic activity LANGreen Off: No Ethernet traffic activity Flashing: Wired LAN traffic activity On: Connect to the Ethernet. Led Status Off: No Wireless LAN activity

Feature Highlights  AP Operation Modes  AP  Repeater  AP with Repeating  Configuration Management  Web-based and Windows-based configuration  SNMP MIBII support (monitoring)

AP with Repeating Wired Network AP with Repeating Wired Network The AP is capable of performing AP and Wireless Bridge function at the same time. Same channel is required for all bridges.

AP / Repeater only AP with Repeating Wired Network Repeater Bridge While using a wireless bridge in this configuration has the advantage of extending the link, it has the disadvantage of decreased throughput due to having to repeat all frames using the same half duplex radio. Same channel is required for all bridges. Bridge (repeater) Bridge (repeater)

 Standard: Wi-Fi Compliant (not certified) Wi-Fi Compliant (not certified)  Security  WEP encryption up to 128-bits  MAC Filtering (up to 128 wireless nodes)  Hidden Access Point Feature Highlights (Cont.)

What security means does b Access Point provide? (I)  WEP  40bit encryption  Alphanumeric: 5 characters  Hexadecimal: 10 hexadecimal digits  128bit encryption  Alphanumeric: 13 characters  Hexadecimal: 26 hexadecimal digits

What security means does b Access Point provide? (II)  MAC Access Control  Enable MAC access control  Click “Add” to enter MAC addresses  Click “Apply”  Only the client with the MAC address that is listed on the table is allowed to associate with the Access Point  At most 128 clients

What security means does b Access Point provide? (III)  Enable Security and select “Hide Access Point” to make AP invisible for AP browsing engaged by stations.  If stations get the correct SSID, stations still can connect to AP by assigning SSID manually.

802.11b Access Point Management/Configuration

How to configure the b Access Point  Via Web-based utility  Via Windows-based utility

Windows-Based Utility Password: default By installing and using Wireless Access Point Utility in Any PC on the local network, you may then access and configure the Wireless Station Adapter Anywhere on the local network.

Windows-Based Utility - Info Shows the Current Information of the Wireless Station Adapter, including ESSID, AP name, Channel, Mode, SNMP, DHCP Client, IP address, subnetmask and default gateway.

Windows-Based Utility – Parameter Setup Configurable parameters includes ESSID, AP name, Channel, Mode, SNMP, DHCP Client, IP address subnetmask, default gateway and password.

Windows-Based Utility – Security To prevent unauthorized wireless stations from accessing data transmitted over the network, the Wireless LAN Micro Access Point offers security Options such as WEP, MAC Access Control as well as Hide AP Access.

Windows-Based Utility – WEP For 40-bit WEP  ASCII: 5 characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (e.g. MyKey)  Hex: 10 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (e.g. 11AA22BB33)  Passphrase: click Generate to generate WEP keys automatically. For 128-bit WEP  ASCII: 13 characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (e.g. MyKey )  Hex: 26 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (e.g AABBCC)  Passphrase : click Generate to generate WEP keys automatically.

Windows-Based Utility – MAC Access Control With the Access Control Table enabled, you can authorize wireless units to access the Access Point by identifying the MAC address of the wireless devices that are allowed access to transmit data.

Windows-Based Utility – Hide AP Access With hide AP access enabled by checking “Hide AP Access” check box, wireless stations with ESSID “ ANY ” will not browser and associate to the Wireless Micro Access Point.

Windows-Based Utility – About Shows the Current Utility and Firmware of the Wireless Access point

Windows-Based Utility – About With the Firmware Upgrade Utility, you will be able to upgrade any of the b Access Point on the network. Password : default

WEB-Based Utility – Login

WEB-Based Utility – Info

WEB-Based Utility – Configuration

WEB-Based Utility – WEP

WEB-Based Utility – Hide AP and MAC Access Control

WEB-Based Utility – TCP/IP

802.11b Access Point FAQs

How to reset b Access Point to the default?  Software  Press the “Default” button of the utility.  Hardware  Press the “Default” button by the side of the LAN port on hardware

How to upgrade firmware  Firmware upgrade utility  Add *.bin file  Press “Upgrade” button.

How many Wireless Bridges can the b Access Point grant the connection with?  Software limit  At most 256 clients  Suggestion  No more than 4 clients  Cells around each repeater will overlap by a minimum of 50%

How to use the “AP with Repeating Mode”  From the “Mode” item on utility, select “AP+Repeater”.  The same channel is required to all Access Points.

How does SNMP work in b Access Point?  Enable SNMP.  Install a SNMP management tool to compile the MIB files and use the tool or other tools to monitor the SNMP agent.

802.11b Device Point

802.11b Device point Hardware Overview  Solution  Atmel (Z-Com)  Power Supply - 5V  LAN Port  One 10Base RJ45 LAN port, a cross Ethernet cable is included  Antenna Design  One Dipole and one PIFA  Output Power 18dBm typical

PWR Green Power enabled WLAN Green Off: No Wireless LAN traffic activity Flashing: Wireless LAN traffic activity On: Associated to the Wireless AP. LAN Green Off: No Ethernet traffic activity Flashing: Wired LAN traffic activity On: Connect to the Ethernet. Hardware Overview (Cont.)

What security means does the b Device Point provide?  WEP  40bit encryption  Alphanumeric: 5 characters  Hexadecimal: 10 hexadecimal digits  128bit encryption  Alphanumeric: 13 characters  Hexadecimal: 26 hexadecimal digits  Passphrase  ASCII string

Act just like Wireless Station Access Point Wired Network Device Point Internet

Act just like Wireless Station Access Point Wired Network Device Point Multi-Client Support (will probably be available) Device Point Internet

How to configure the b Device Point?  Via Web-based utility  Via Windows-based utility

Windows-Based Utility Password: default By installing and using Station Adapter Utility in Any PC on the local network, you may then access and configure the b Device Point Anywhere on the local network.

Windows-Based Utility - Info Shows the Current Information of the Device point, including ESSID, AP name, TX rate, IP address, subnetmask and default gateway.

Windows-Based Utility – Parameter Setup Configurable parameters includes ESSID, AP name, TX rate, IP address subnetmask, default gateway and password.

Windows-Based Utility – Security To prevent unauthorized wireless stations from accessing data transmitted over the network, the b Device Point offers WEP security options.

Windows-Based Utility – Security For 40-bit WEP  ASCII: 5 characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (e.g. MyKey)  Hex: 10 hexadecimal digits in the range of “A- F”, “a-f” and “0-9” (e.g. 11AA22BB33)  Passphrase: click Generate to generate WEP keys automatically. For 128-bit WEP  ASCII: 13 characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (e.g. MyKey )  Hex: 26 hexadecimal digits in the range of “A- F”, “a-f” and “0-9” (e.g AABBCC)  Passphrase : click Generate to generate WEP keys automatically.

Windows-Based Utility – About Shows the Current Utility and Firmware of the b Device Point

Firmware Upgrade Utility Allow you to upgrade the firmware for the Device point. Password: default

WEB-Based Utility – Info

802.11b Device Point FAQs

How to reset the b Device Point to the default?  Software  Press the “Default” button of the utility.  Hardware  Press the “Default” button by the side of the LAN port on hardware

How to upgrade firmware  Firmware upgrade utility  Add *.bin file  Press “Upgrade” button.

Does the b Device Point support Wireless Workgroup Bridge?  No, not today:  But it will probably support Wireless Ethernet Bridge (same as Wireless Workgroup Bridge) on the later version.  The number of Ethernet clients will be limited to under 8.

Demonstration/ Hands On Training

Questions