Configure A Wireless Router: LAN Switching and Wireless - Chapter 7
Configure A Wireless Router: LAN Switching and Wireless - Chapter 7
Cisco Public
Objectives
Cisco Public
Topics
Components and basic operation of wireless LANs Basic WLAN security
Cisco Public
Semester 3
LAN Design Basic Switch Concepts VLANs VTP STP Wireless
Inter-VLAN routing
4
Cisco Public
Wireless advantages
Stay in contact while travelling. Move workstation within building without moving cables. In new building, save cost of cabling the whole building just some cables needed. Use a variety of wireless devices. Can link to cabled network.
Cisco Public
Wireless problems
Interference Signal strength, blind spots
Cisco Public
Standards
PAN Standards Bluetooth 802.15.3 LAN 802.11 MAN 802.11 802.16 802.20 WAN GSM CDMA Satellite
Speed
Range
< 1 Mbps
Short
11-54 Mbps
medium
Cisco Public
Cisco Public
Cisco Public
802.11a
Introduced 1999, not compatible with 802.11b OFDM modulation (faster, up to 54Mbps)
Cisco Public
10
802.11b
Introduced 1999, not compatible with 802.11a DSSS modulation, slower, 1, 2, 5.5, 11 Mbps
Cisco Public
11
802.11g
Introduced 2003 Compatible with 802.11b
Cisco Public
12
802.11n
Expected Sept 2008, in draft now. May use both 2.4 and 5 GHz band
MIMO-OFDM Splits high data rate stream into several low data rate streams, transmits simultaneously using multiple antennae.
Possibly up to 248 Mbps with 2 streams Longer range, 70 metres
Cisco Public
13
Cisco Public
14
Organisations
ITU-R allocates RF spectrum bands and satellite orbits IEEE develops and maintains 802 standards for LANs and MANs including wireless modulation Wi-Fi Alliance certifies that vendors keep to standards and industry norms so that devices can operate together
Cisco Public
15
Wireless NIC
Needed to connect a device to an access point. Laptops used to have PCMCIA cards. Some still do, but now the NIC is usually built in. Desktops can have expansion cards installed, or they can use a USB device.
Cisco Public
16
Cisco Public
17
Hidden nodes
If two stations cannot sense each others signals then they may transmit at the same time and have a collision. Request to send/clear to send (RTS/CTS) avoids this. Station requests the medium, access point allocates it for long enough to complete the transmission.
Cisco Public
18
Wireless router
Commonly used for Internet access Acts as router, Ethernet switch and wireless access point. Configure for mode 802.11a, b, g, or n Configure shared service set identifier (SSID) to identify network
Select channel within 2.4GHz band. Adjacent access points need non-overlapping channels.
Cisco Public
19
Ad hoc topology
No access point Peer to peer Negotiate parameters Independent basic service set Area covered is basic service area (BSA).
Cisco Public
20
Infrastructure mode
Area covered is basic service area (BSA).
Cisco Public
21
Infrastructure mode
Area covered is extended service area (ESA).
Cisco Public
22
Cisco Public
23
Authentication
Client requests authentication. Access point responds.
802.11 had two authentication mechanisms. NULL (Open Authentication) does not give privacy. Wired Equivalency Protection (WEP) uses a shared key.
Cisco Public
24
Association
Request from client and response. Finalizes security options
Access point maps a logical port known as the association identifier (AID) to the WLAN client.
Cisco Public
25
Cisco Public
26
Security threats
War drivers look for an unsecured network that will provide Internet access. Hackers (Crackers) enter systems to steal data or cause harm. They can often get past weak security. Employees may install rogue access points without permission and without implementing the necessary security.
Cisco Public
27
Cisco Public
28
Uses packet sniffing software, such as Wireshark, to observe a client station connecting to an access point. Detects names, IP addresses, ID and the challenge and associate response.
Can then monitor network.
Cisco Public
29
Denial of service
Use common devices to create interference. (cordless phone, microwave, baby monitor) Flood the network with clear-to-send (CTS) messages. Clients then send simultaneously and cause a constant stream of collisions. Send a series of disassociate commands so that clients repeatedly disconnect then try to reassociate.
Cisco Public
30
Cisco Public
31
Authentication developments
Vendors created their own security systems Wi-Fi Alliance developed WiFi Protected Access (WPA) security method. 802.11i standard introduced - similar to the Wi-Fi Alliance WPA2 standard.
Cisco Public
32
33
Cisco Public
34
Cisco Public
35
Network Name (SSID) should be changed from the default. Must be the same for all devices on the network.
SSID broadcast can be enabled or disabled.
Cisco Public
36
Wide Channel - If you selected Wide for the Radio Band, Select a channel from the drop-down menu. Standard Channel - Select the channel.
Cisco Public
37
Security
Choose PSK2 (WPA2 or IEEE 802.11i) if all client devices are able to use it. If some older devices do not support WPA2 then choose the best security mode that is supported by all devices. Encryption AES is stronger than TKIP. Use AES with WPA2.
Cisco Public
38
Cisco Public
39
Troubleshooting
Generally start with the physical layer and then move up. Eliminate the client PC as the source of trouble before checking the rest of the network.
Cisco Public
40
Troubleshooting no connectivity
Check that the PC has an IP address. Try connecting the PC to the wired network and ping a known address Try a different wireless NIC. Reload drivers as necessary. Check the security mode and encryption settings on the client. Do they match the access point?
Cisco Public
41
Check for devices that might be causing interference (cordless phone, microwave oven etc).
Cisco Public
42
Cisco Public
43
Cisco Public
44
Cisco Public
45
Cisco Public
46
Cisco Public
47
Summary
Wireless LANs use standards such as
IEEE 802.11a IEEE 802.11b IEEE 802.11g
IEEE 802.11n
Cisco Public
48
Summary
WLAN security practices/methods include
MAC address filtering SSID making Implementing WPA2
Cisco Public
49
Cisco Public
50