Wireless LAN: Cisco Ccna Bootcamp
Wireless LAN: Cisco Ccna Bootcamp
Wireless LAN
Why have Wireless LANs Become so Popular?
Internetworking 3
Comparing a WLAN to a LAN
• WLANs use radio frequencies (RF) instead of cables at the
physical layer and MAC sub-layer of the data link layer.
–RF does not have boundaries, such as the limits of a wire.
–RF is unprotected from outside signals.
–RF transmission is subject to the same challenges inherent in
any wave-based technology. For example, as you get further away
from the source, eventually you may lose the signal all together.
–RF bands are regulated differently in various countries.
• WLANs connect clients to the network through a wireless
access point (AP) instead of an Ethernet switch.
• WLANs connect mobile devices that are often battery
powered.
–Wireless NICs tend to reduce the battery life of a mobile device.
• WLANs support hosts that contend for access on the RF
media (frequency bands).
–802.11 prescribes collision-avoidance instead of collision-
detection for media access to proactively avoid collisions within
the media.
• WLANs use a different frame format than wired Ethernet
LANs.
–WLANs require additional information in the Layer 2 header.
• WLANs raise more privacy issues
–because radio frequencies can reach outside the facility.
Internetworking 4
Introducing Wireless LANs
Internetworking 5
Wi-Fi Certification
Internetworking 6
Wireless NICs
• The device that makes a client station capable of
sending and receiving RF signals is the wireless NIC.
–Like an Ethernet NIC, the wireless NIC, using the
modulation technique it is configured to use,
encodes a data stream onto an RF signal.
–Wireless NICs are most often associated with
mobile devices, such as laptop computers.
–In the 1990s , wireless NICs for laptops were
cards that slipped into the PCMCIA slot.
• PCMCIA wireless NICs are still common, but
many manufacturers have begun building the
wireless NIC right into the laptop.
• Unlike 802.3 Ethernet interfaces built into PCs,
the wireless NIC is not visible, because there is
no requirement to connect a cable to it.
Internetworking 7
Wireless Access Points
Internetworking 8
CSMA/CA
• Access points oversee a distributed coordination
function (DCF) called Carrier Sense Multiple Access
with Collision Avoidance (CSMA/CA).
• This simply means that devices on a WLAN must
sense the medium for energy (RF stimulation above a
certain threshold) and wait until the medium is free
before sending.
–If an access point receives data from a client station, it
sends an acknowledgement to the client that the data has
been received.
–This acknowledgement keeps the client from assuming
that a collision occurred and prevents a data
retransmission by the client.
–Imagine two client stations that both connect to the
access point, but are at opposite sides of its reach. If they
are at the maximum range to reach the access point, they
will not be able to reach each other. So neither of those
stations sense the other on the medium, and they may
end up transmitting simultaneously. This is known as the
hidden node (or station) problem.
Internetworking 9
Wireless Routers
Internetworking 13
Client and Access Point
Association
• A key part of the 802.11 process is discovering a
WLAN and subsequently connecting to it.
• The primary components of this process are as
follows:
–Beacons - Frames used by the WLAN
network to advertise its presence.
• The primary purpose of the beacon is to
allow WLAN clients to learn which
networks and access points are available
in a given area, thereby allowing them to
choose which network and access point
to use. Access points may broadcast
beacons periodically.
–Probes - Frames used by WLAN clients to
find their networks.
–Authentication - A process which is an
artifact from the original 802.11 standard, but
still required by the standard.
–Association - The process for establishing
the data link between an access point and a
WLAN client.
Internetworking 14
Threats to Wireless Security: Unauthorized Access
• A WLAN is open to anyone within range of an access point and the
appropriate credentials to associate to it.
• 3 major threat that lead to unauthorized access:
1. War drivers
• War driving means driving around a neighborhood with a wireless
laptop and looking for an unsecured 802.11b/g system.
2. Hackers (Crackers)
• Today, the terms hacker and cracker have come to mean malicious
intruders who enter systems as criminals and steal data or
deliberately harm systems.
• Tools with a legitimate purpose, such as wireless sniffers can be
used by intruders to exploit security weaknesses.
• Rogue Access Points
–A rogue access point is an access point placed on a WLAN that
is used to interfere with normal network operation.
–A rogue access point also could be configured to provide
unauthorized users access.
3. Employees
• A simple and common version of a rogue access point is one
installed by employees without authorization.
–These access points typically do not have the necessary
security configuration, so the network ends up with a security
hole.
Internetworking 15
Threats to Wireless Security: Man-in-the-Middle Attacks
Internetworking 16
Threats to Wireless Security: Denial of Service
Internetworking 18
Encryption
Internetworking 19
Overview of Configuring the Wireless Access Point
Internetworking 20
Overview of Configuring the Wireless Access Point
Internetworking 21
Configuring Basic Wireless Settings
• The Basic Setup screen is the first screen you see when you
access the web-based utility.
–Click the Wireless tab and then select the Basic Wireless
Settings tab.
• Network Mode
–If you have Wireless-N, Wireless-G, and 802.11b devices in
your network, keep Mixed, the default setting.
–If you have Wireless-G and 802.11b devices, select BG-
Mixed.
–If you have only Wireless-N devices, select Wireless-N
Only.
–If you have only Wireless-G devices, select Wireless-G
Only.
–If you have only Wireless-B devices, select Wireless-B
Only.
–If you want to disable wireless networking, select Disable.
• Network Name (SSID) - The SSID is the network name shared
among all points in a wireless network.
–The SSID must be identical for all devices in the wireless
network.
–It is case-sensitive and must not exceed 32 characters
(use any of the characters on the keyboard).
–For added security, you should change the default SSID
(linksys) to a unique name.
Internetworking 22
Configuring Basic Wireless Settings
Internetworking 23
Scan for SSIDs
• When the access point has been configured, you need
to configure the wireless NIC on a client device to
allow it to connect to the wireless network.
–You also should verify that the wireless client has
successfully connected to the correct wireless network,
especially since there may be many WLANs available with
which to connect.
• The steps below are for using the View Wireless
Networks feature in Microsoft Windows XP.
–Step 1. On the Microsoft Windows XP toolbar system
tray, find the network connection icon that looks similar to
the one shown in the figure. Double-click the icon to open
the Network Connections dialog box.
–Step 2. Click the View Wireless Networks button in the
dialog box.
–Step 3. Observe the wireless networks that your wireless
NIC has been able to detect.
• If you have a WLAN that is not showing up on the list
of networks, you may have disabled SSID broadcast
on the access point.
–If this is the case, you must enter the SSID manually.
Internetworking 24
Verify Connectivity to the Wireless Lan
Internetworking 26
A Systematic Approach to WLAN Troubleshooting
Internetworking 27
-- End of presentation --
Internetworking 28