CCNA Exp3 - Chapter07 - Basic Wireless Concepts and Configuration

Download as pdf or txt
Download as pdf or txt
You are on page 1of 79

Chapter 7: Basic Wireless Concepts and Configuration

CCNA Exploration 4.0

Please purchase a personal license.

Objectives

Describe the components and operations of basic wireless LAN topologies. Describe the components and operations of basic wireless LAN security. Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

The Wireless LAN

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Why Use Wireless?

Business networks today are evolving to support people who are on


the move. Mobility environment: where people can take their connection to the network along with them on the road. There are many different infrastructures (wired LAN, service provider networks) that allow mobility like this to happen, but in a business environment, the most important is the WLAN. People now expect to be connected at any time and place
H c vi n m ng Bach Khoa - Website: www.bkacad.com 4

Benefits of WLANs

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Wireless Technologies

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Wireless LAN

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Comparing a WLAN to a LAN

In an 802.3 Ethernet LAN, each client has


a cable that connects the client NIC to a switch. The switch is the point where the client gains access to the network. In a wireless LAN, each client uses a wireless adapter to gain access to the network through a wireless device such as a wireless router or access point.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 8

Wireless standards

H c vi n m ng Bach Khoa - Website: www.bkacad.com

Wi-Fi Certification

H c vi n m ng Bach Khoa - Website: www.bkacad.com

10

Wireless Infrastructure Components

H c vi n m ng Bach Khoa - Website: www.bkacad.com

11

Extra: Wireless LAN Frame

H c vi n m ng Bach Khoa - Website: www.bkacad.com

12

Wireless Access Points

H c vi n m ng Bach Khoa - Website: www.bkacad.com

13

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

Access points oversee a distributed coordination function (DCF) called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). This simply means that devices on a WLAN must sense the medium for energy (RF stimulation above a certain threshold) and wait until the medium is free before sending.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 14

RTS/CTS

One means of resolving the hidden node problem is a CSMA/CA

feature called request to send/clear to send (RTS/CTS). RTS/CTS was developed to allow a negotiation between a client and an access point.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 15

Extra: RTS/CTS
The optional request-to-send and clear-to-send (RTS/CTS) function
allows the access point to control use of the medium for stations activating RTS/CTS. With most radio NICs, users can set a maximum frame-length threshold for when the radio NIC activates RTS/CTS. For example, a frame length of 1,000 bytes triggers RTS/CTS for all frames larger than 1,000 bytes. If the radio NIC activates RTS/CTS, it first sends an RTS frame to an access point before sending a data frame. The access point then responds with a CTS frame, indicating that the radio NIC can send the data frame. With the CTS frame, the access point provides a value in the duration field of the frame header that holds off other stations from transmitting until after the radio NIC initiating the RTS can send its data frame. This avoids collisions between hidden nodes. The RTS/CTS handshake continues for each frame, as long as the frame size exceeds the threshold set in the corresponding radio NIC.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 16

Extra: RTS/CTS

H c vi n m ng Bach Khoa - Website: www.bkacad.com

17

Configurable Parameters for Wireless Endpoints

H c vi n m ng Bach Khoa - Website: www.bkacad.com

18

Configurable Parameters for Wireless Endpoints


If there are three adjacent access points, use channels 1, 6, and 11. If
there are just two, select any two that are five channels apart, such as channels 5 and 10.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

19

802.11 Topologies: Ad hoc Network

H c vi n m ng Bach Khoa - Website: www.bkacad.com

20

802.11 Topologies: Infrastructure

Basic Service Sets

H c vi n m ng Bach Khoa - Website: www.bkacad.com

21

802.11 Topologies: Infrastructure

Extended Service Sets

H c vi n m ng Bach Khoa - Website: www.bkacad.com

22

Extra: Roaming

H c vi n m ng Bach Khoa - Website: www.bkacad.com

23

Extra: Roaming

H c vi n m ng Bach Khoa - Website: www.bkacad.com

24

Extra: Scanning
The 802.11 standard defines both passive and active scanning,
whereby a radio NIC searches for access points. Passive scanning is mandatory where each NIC scans individual channels to find the best access-point signal. Periodically, access points broadcast a beacon, and the radio NIC receives these beacons while scanning and takes note of the corresponding signal strengths. The beacons contain information about the access point, including SSID and supported data rates. The radio NIC can use this information along with the signal strength to compare access points and decide on which one to use. Active scanning is similar, except the radio NIC initiates the process by broadcasting a probe frame, and all access points within range respond with a probe response. Active scanning enables a radio NIC to receive immediate response from access points, without waiting for a beacon transmission. The issue, however, is that active scanning imposes additional overhead on the network because of the transmission of probe and corresponding response frames.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

25

Client and Access Point Association

Beacon

H c vi n m ng Bach Khoa - Website: www.bkacad.com

26

Client and Access Point Association

H c vi n m ng Bach Khoa - Website: www.bkacad.com

27

Client and Access Point Association


Step 3 - 802.11 Association

H c vi n m ng Bach Khoa - Website: www.bkacad.com

28

Extra: Authentication and Association

Open Authentication and Shared Key Authentication are the two methods that the 802.11 standard defines for clients to connect to an access point. The association process can be broken down into three elements: 1. Probe 2. Authentication 3. Association.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 29

Extra: Open Authentication

The Open Authentication method performs the entire authentication

process in clear text. Open Authentication is basically a null authentication, which means there is no verification of the user or machine. Open Authentication is usually tied to a WEP key. A client can associate to the access point with an incorrect WEP key or even no WEP key. A client with the wrong WEP key will be unable to send or receive data, since the packet payload will be encrypted. Keep in mind that the header is not encrypted by WEP. Only the payload or data is encrypted.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 30

Extra: Shared Key Authentication

Shared Key Authentication works similarly to Open Authentication,

except that it uses WEP encryption for one step. Shared key requires the client and the access point to have the same WEP key. An access point using Shared Key Authentication sends a challenge text packet to the client. If the client has the wrong key or no key, it will fail this portion of the authentication process. The client will not be allowed to associate to the AP. Shared key is vulnerable to a man-in-the-middle attack, so it is not recommended.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 31

Extra: ARS

When a source node sends a frame, the receiving node returns a

positive acknowledgment (ACK). This can cause consumption of 50% of the available bandwidth. This overhead when combined with the collision avoidance protocol overhead reduces the actual data throughput to a maximum of 5.0 to 5.5 Mbps on an 802.11b wireless LAN rated at 11 Mbps. Performance of the network will also be affected by signal strength and degradation in signal quality due to distance or interference. As the signal becomes weaker, Adaptive Rate Selection (ARS) may be invoked and the transmitting unit will drop the data rate from 11 Mbps to 5.5 Mbps, from 5.5 Mbps to 2 Mbps or 2 Mbps to 1 Mbps.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

32

Planning the Wireless LAN

H c vi n m ng Bach Khoa - Website: www.bkacad.com

33

Planning the Wireless LAN

H c vi n m ng Bach Khoa - Website: www.bkacad.com

34

Planning the Wireless LAN

H c vi n m ng Bach Khoa - Website: www.bkacad.com

35

Planning the Wireless LAN

H c vi n m ng Bach Khoa - Website: www.bkacad.com

36

Activity 7.1.5.2

H c vi n m ng Bach Khoa - Website: www.bkacad.com

37

Activity 7.1.5.2

H c vi n m ng Bach Khoa - Website: www.bkacad.com

38

Wireless LAN Security

H c vi n m ng Bach Khoa - Website: www.bkacad.com

39

Wireless LAN Security Threats


Unauthorized Access

H c vi n m ng Bach Khoa - Website: www.bkacad.com

40

Wireless LAN Security Threats

H c vi n m ng Bach Khoa - Website: www.bkacad.com

41

Wireless LAN Security Threats

Denial of Service

H c vi n m ng Bach Khoa - Website: www.bkacad.com

42

Extra: Securing a WLAN

H c vi n m ng Bach Khoa - Website: www.bkacad.com

43

Extra: SSID

Most access points have options like SSID broadcast and allow any

SSID. These features are usually enabled by default and make it easy to set up a wireless network. Using the allow any SSID option lets the access point allow access to a client with a blank SSID. The SSID broadcast sends beacon packets, which advertise the SSID. Disabling these two options do not secure the network, since a wireless sniffer can easily capture a valid SSID from normal WLAN traffic. SSIDs should not be considered a security feature.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 44

Wireless Security Protocols

H c vi n m ng Bach Khoa - Website: www.bkacad.com

45

Extra: Wireless Security Protocols

H c vi n m ng Bach Khoa - Website: www.bkacad.com

46

Extra: Encryption Methods

Many encryption methods, such as the 802.11 Wired Equivalent Privacy (WEP), are symmetricthat is, the same key that does the encryption is also the one that performs the decryption. If a user activates WEP, the NIC encrypts the payload (frame body and cyclic redundancy check [CRC]) of each 802.11 frame before transmission using an RC4 stream cipher provided by RSA security. The receiving station, such as an access point or another radio NIC, performs decryption upon arrival of the frame. As a result, 802.11 WEP only encrypts data between 802.11 stations. Once the frame enters the wired side of the network, such as between access points, WEP no longer applies.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 47

Extra: Encryption Methods

Wi-Fi Protected Access


The Wi-Fi Protocol Access (WPA) standard provided by the Wi-Fi Alliance provides an upgrade to WEP that offers dynamic key encryption and mutual authentication. Most wireless vendors now support WPA. WPA clients utilize different encryption keys that change periodically. This makes it more difficult to crack the encryption.

H c vi n m ng Bach Khoa - Website: www.bkacad.com

48

Wireless Security Protocols

H c vi n m ng Bach Khoa - Website: www.bkacad.com

49

Wireless Security Protocols

H c vi n m ng Bach Khoa - Website: www.bkacad.com

50

Wireless Security Protocols

Encryption

H c vi n m ng Bach Khoa - Website: www.bkacad.com

51

Securing a Wireless LAN

H c vi n m ng Bach Khoa - Website: www.bkacad.com

52

Configure Wireless LAN Access

H c vi n m ng Bach Khoa - Website: www.bkacad.com

53

Configuring the Wireless Access Point

H c vi n m ng Bach Khoa - Website: www.bkacad.com

54

Setup: Basic Setup

H c vi n m ng Bach Khoa - Website: www.bkacad.com

55

Administration: Management

H c vi n m ng Bach Khoa - Website: www.bkacad.com

56

Configuring Basic Wireless Settings

H c vi n m ng Bach Khoa - Website: www.bkacad.com

57

Security Mode

Select the mode you want to use: PSK-Personal, PSK2Personal, PSK-Enterprise, PSK2-Enterprise, RADIUS, or WEP.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 58

Mode Parameters

Enterprise modes are not configured in this chapter


H c vi n m ng Bach Khoa - Website: www.bkacad.com 59

Configure Encryption and Key

H c vi n m ng Bach Khoa - Website: www.bkacad.com

60

Configure a wireless NIC: Scan SSID

H c vi n m ng Bach Khoa - Website: www.bkacad.com

61

Configure a wireless NIC: Scan SSID

H c vi n m ng Bach Khoa - Website: www.bkacad.com

62

Select the Wireless Security Protocol

Practice: 7.3.2.4
H c vi n m ng Bach Khoa - Website: www.bkacad.com 63

Troubleshooting Simple WLAN Problems

H c vi n m ng Bach Khoa - Website: www.bkacad.com

64

Systematic Approach to WLAN Troubleshooting

Step 1 - Eliminate the client device as the source of the problem. Step 2 - Confirm the physical status of WLAN devices. Step 3 - Inspect wired links.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 65

Updating the Access Point Firmware

H c vi n m ng Bach Khoa - Website: www.bkacad.com

66

Incorrect Channel Settings

H c vi n m ng Bach Khoa - Website: www.bkacad.com

67

Incorrect Channel Settings: Solution

H c vi n m ng Bach Khoa - Website: www.bkacad.com

68

Solving RF Interference

H c vi n m ng Bach Khoa - Website: www.bkacad.com

69

Solving RF Interference

Site Surveys

H c vi n m ng Bach Khoa - Website: www.bkacad.com

70

Site Survey

Two categories: Manual and utility assisted. Manual site surveys can include a site evaluation to be followed by a more thorough utility-assisted site survey. A site evaluation involves inspecting the area with the goal of identifying potential issues that could impact the network. Specifically, look for the presence of multiple WLANs, unique building structures, such as open floors and atriums, and high client usage variances, such as those caused by differences in day or night shift staffing levels. Note: you do not conduct site surveys as part of this course
H c vi n m ng Bach Khoa - Website: www.bkacad.com 71

Access Point Misplacement

H c vi n m ng Bach Khoa - Website: www.bkacad.com

72

Access Point Misplacement: Solution

H c vi n m ng Bach Khoa - Website: www.bkacad.com

73

Access Point Misplacement: Solution


Ensure that access points are not mounted closer than 7.9 inches (20
cm) from the body of all persons. Do not mount the access point within 3 feet (91.4 cm) of metal obstructions. Install the access point away from microwave ovens. Microwave ovens operate on the same frequency as the access point and can cause signal interference. Always mount the access point vertically (standing up or hanging down). Do not mount the access point outside of buildings. Do not mount the access point on building perimeter walls, unless outside coverage is desired. When mounting an access point in the corner of a right-angle hallway intersection, mount it at a 45-degree angle to the two hallways. The access point internal antennas are not omnidirectional and cover a larger area when mounted this way.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 74

Problems with Authentication and Encrytion

H c vi n m ng Bach Khoa - Website: www.bkacad.com

75

Problems with Authentication and Encrytion

H c vi n m ng Bach Khoa - Website: www.bkacad.com

76

Problems with Authentication and Encrytion

H c vi n m ng Bach Khoa - Website: www.bkacad.com

77

Summary

H c vi n m ng Bach Khoa - Website: www.bkacad.com

78

H c vi n m ng Bach Khoa - Website: www.bkacad.com

79

You might also like