Presentation is loading. Please wait.

Presentation is loading. Please wait.

20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.

Similar presentations


Presentation on theme: "20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies."— Presentation transcript:

1 20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies

2 20 November 2015 RE Meyers, Ms.Ed., CCAI Disclaimer  This review is not a comprehensive learning model of the curriculum!  It is intended for chapter pre-exam prep, or post exam review.  Using this presentation as your sole source of teaching or learning will not provide all the information you need to be successful in the Cisco Networking Academy.  All materials, images, text, and content unless noted remains the licensed property of the Cisco Networking Academy.  Please report all errors as soon as possible to: remeyers@mail.wvu.edu

3 20 November 2015 RE Meyers, Ms.Ed., CCAI Objectives  Describe wireless technologies.  Describe the various components and structure of a WLAN  Describe wireless LAN security issues and mitigation strategies  Configure an integrated wireless access point and a wireless client.

4 20 November 2015 RE Meyers, Ms.Ed., CCAI ICG: Section 7.1

5 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless Technology 7.1.1  Wireless operates in 2.4GHZ range

6 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless Technology 7.1.1

7 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless Technology 7.1.2  Advantages over wired LAN’s  Anytime anywhere connectivity  Easy to install; inexpensive  Easy to add devices  Mobility  Greater resources

8 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless Technology

9 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless Technology 7.1.3

10 20 November 2015 RE Meyers, Ms.Ed., CCAI ICG: Section 7.2

11 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s

12 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.1  The Wi-Fi logo on a device means that this equipment meets standards and should interoperate with other devices of the same standard.

13 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.2

14 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.2

15 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.2  SSID – Service Set Identifier  Tells wireless devices which WLAN they belong to  All devices in the WLAN must have the same SSID

16 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.3  Two basic wireless modes  IBSS – ad hoc connects clients in peer-to-peer  BSS - infrastructure

17 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s  Channels are created by dividing up the available RF spectrum.

18 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.5  Most home AP devices can support various modes, mainly 802.11b, 802.11g, and 802.11n

19 20 November 2015 RE Meyers, Ms.Ed., CCAI Wireless LAN’s 7.2.5  SSID Broadcast enabled sends that this router is available

20 20 November 2015 RE Meyers, Ms.Ed., CCAI ICG: Section 7.3

21 20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN  An attacker can access your network from any location your wireless signal reaches.

22 20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN 7.3.1  Change the default settings  SSIDs  Passwords  IP addresses

23 20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN  MAC address filtering uses the MAC address to identify which devices are allowed to connect to the wireless network

24 20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN 7.3.3  AP authentication  Open authentication is used by default  Pre-shared keys (PSK) - AP and client must be configured with the same key or secret word  Extensible Authentication Protocol (EAP) - client communicates with a backend authentication server

25 20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN 7.3.4  Encryption is the process of transforming data so that even if it is intercepted it is unusable  Wired Equivalency Protocol (WEP) uses pre-configured keys 64 bits or 128 bits long  Wi-Fi Protected Access (WPA) is more secure than WEP because it is significantly more difficult to crack.

26 20 November 2015 RE Meyers, Ms.Ed., CCAI Security Considerations on a WLAN 7.3.5  Traffic filtering blocks undesirable traffic from entering or leaving the wireless network.

27 20 November 2015 RE Meyers, Ms.Ed., CCAI ICG: Section 7.4

28 20 November 2015 RE Meyers, Ms.Ed., CCAI Configuring and ISR and Client  Plan for a wireless LAN implementation

29 20 November 2015 RE Meyers, Ms.Ed., CCAI Configuring and ISR and Client

30 20 November 2015 RE Meyers, Ms.Ed., CCAI Configuring and ISR and Client

31 20 November 2015 RE Meyers, Ms.Ed., CCAI Configuring and ISR and Client

32 20 November 2015 RE Meyers, Ms.Ed., CCAI Summary  Wireless technologies use electromagnetic radiation in the form of radio signals to carry information between devices.  Ease and convenience of connecting devices wirelessly creates security concerns that need to be addressed.  Before installing wireless devices, an installation plan should be created which includes strategies for layout and security.

33 20 November 2015 RE Meyers, Ms.Ed., CCAI


Download ppt "20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies."

Similar presentations


Ads by Google