Download presentation
Presentation is loading. Please wait.
Published byMelina Rich Modified over 9 years ago
1
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies
2
20 November 2015 RE Meyers, Ms.Ed., CCAI Disclaimer This review is not a comprehensive learning model of the curriculum! It is intended for chapter pre-exam prep, or post exam review. Using this presentation as your sole source of teaching or learning will not provide all the information you need to be successful in the Cisco Networking Academy. All materials, images, text, and content unless noted remains the licensed property of the Cisco Networking Academy. Please report all errors as soon as possible to: remeyers@mail.wvu.edu
3
20 November 2015 RE Meyers, Ms.Ed., CCAI Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless LAN security issues and mitigation strategies Configure an integrated wireless access point and a wireless client.
4
20 November 2015 RE Meyers, Ms.Ed., CCAI ICG: Section 7.1
5
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless Technology 7.1.1 Wireless operates in 2.4GHZ range
6
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless Technology 7.1.1
7
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless Technology 7.1.2 Advantages over wired LAN’s Anytime anywhere connectivity Easy to install; inexpensive Easy to add devices Mobility Greater resources
8
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless Technology
9
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless Technology 7.1.3
10
20 November 2015 RE Meyers, Ms.Ed., CCAI ICG: Section 7.2
11
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s
12
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.1 The Wi-Fi logo on a device means that this equipment meets standards and should interoperate with other devices of the same standard.
13
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.2
14
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.2
15
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.2 SSID – Service Set Identifier Tells wireless devices which WLAN they belong to All devices in the WLAN must have the same SSID
16
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.3 Two basic wireless modes IBSS – ad hoc connects clients in peer-to-peer BSS - infrastructure
17
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s Channels are created by dividing up the available RF spectrum.
18
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.5 Most home AP devices can support various modes, mainly 802.11b, 802.11g, and 802.11n
19
20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.5 SSID Broadcast enabled sends that this router is available
20
20 November 2015 RE Meyers, Ms.Ed., CCAI ICG: Section 7.3
21
20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN An attacker can access your network from any location your wireless signal reaches.
22
20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN 7.3.1 Change the default settings SSIDs Passwords IP addresses
23
20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN MAC address filtering uses the MAC address to identify which devices are allowed to connect to the wireless network
24
20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN 7.3.3 AP authentication Open authentication is used by default Pre-shared keys (PSK) - AP and client must be configured with the same key or secret word Extensible Authentication Protocol (EAP) - client communicates with a backend authentication server
25
20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN 7.3.4 Encryption is the process of transforming data so that even if it is intercepted it is unusable Wired Equivalency Protocol (WEP) uses pre-configured keys 64 bits or 128 bits long Wi-Fi Protected Access (WPA) is more secure than WEP because it is significantly more difficult to crack.
26
20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN 7.3.5 Traffic filtering blocks undesirable traffic from entering or leaving the wireless network.
27
20 November 2015 RE Meyers, Ms.Ed., CCAI ICG: Section 7.4
28
20 November 2015 RE Meyers, Ms.Ed., CCAI Configuring and ISR and Client Plan for a wireless LAN implementation
29
20 November 2015 RE Meyers, Ms.Ed., CCAI Configuring and ISR and Client
30
20 November 2015 RE Meyers, Ms.Ed., CCAI Configuring and ISR and Client
31
20 November 2015 RE Meyers, Ms.Ed., CCAI Configuring and ISR and Client
32
20 November 2015 RE Meyers, Ms.Ed., CCAI Summary Wireless technologies use electromagnetic radiation in the form of radio signals to carry information between devices. Ease and convenience of connecting devices wirelessly creates security concerns that need to be addressed. Before installing wireless devices, an installation plan should be created which includes strategies for layout and security.
33
20 November 2015 RE Meyers, Ms.Ed., CCAI
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.