PKT Radius PDF
PKT Radius PDF
PKT Radius PDF
We will also add a server (RADIUS) to this topology and enable RADIUS
authentication. WPA2-PSK enterprise will be the mode of authentication we will
choose in the Linksys router (Wireless Router0). After building this topology, switch
the default module of the laptop (Laptop0) with a Linksys-WMP300N module. Open
the Linksys router, go to the GUI tab, navigate to the Wireless tab, and change the
SSID field. We'll be using Linksys for this demo, as shown in the following figure:
Open the server, navigate to the Config tab, select AAA, and configure RADIUS
authentication with four user credentials. Configuration will be as follows.
[ 90 ]
www.it-ebooks.info
Chapter 9
UserName Password
alice pwd
bob s3ret
john secr3t
user1 passwd
Configure a static IP for the server as 192.168.0.50. Next, under the GUI tab
of the Linksys router, navigate to Wireless | Wireless security and enter the
following settings:
Move on to the wireless end devices, go to the Config tab, select Wireless, and enter
the following settings:
• SSID: Linksys
• Authentication: WPA2
• User ID: john
• Password: secr3t
Make sure you use a different pair of credentials for each wireless end device. Once
this is configured, the end device will get an IP address and you'll see the wireless
link indicating a connection.
[ 91 ]
www.it-ebooks.info
Setting Up a Wireless Network
Now, we'll configure the laptop that has the Linksys module. Go to the Desktop tab,
open the PC Wireless utility, choose the Profiles tab, and click on New. Enter any
name here, you'll see a list with the SSID name shown, click on Advanced Setup and
a wizard will guide you through the process.
Use the simple PDU tool to test the connectivity. If you use the simulation mode
before a wireless connection is established between two devices, you will see the
RADIUS packet being sent to the server by the router.
Summary
This chapter introduced you to the wireless devices used in Packet Tracer. We also
configured a simple wireless topology without any authentication and used the
physical workspace to demonstrate the range of wireless devices. Finally, we mixed
technologies such as WPA2, RADIUS, and DHCP and created a topology that uses
Linksys devices.
In the next chapter, we'll see how to segment a network at Layer 2 by configuring
VLANs, and also see how to configure routing between VLANs.
[ 92 ]
www.it-ebooks.info