ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Configure a Wireless Router LAN Switching and Wireless   – Chapter 7
Objectives Describe the components and operations of basic wireless LAN topologies. Describe the components and operations of basic wireless LAN security. Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.
Explain the Components and Operations of Basic Wireless LAN Topologies   Describe why wireless LANs are a popular choice for small business LAN implementations
Explain the Components and Operations of Basic Wireless LAN Topologies   Describe the 802.11 wireless standards
Explain the Components and Operations of Basic Wireless LAN Topologies   Describe the components of a 802.11-based wireless infrastructure
Explain the Components and Operations of Basic Wireless LAN Topologies   Describe how wireless networks operate
Explain the Components and Operations of Basic Wireless LAN Topologies   Describe how to plan a wireless LAN
Explain the Components and Operations of Basic Wireless LAN Security   Describe the threats to wireless LAN security
Explain the Components and Operations of Basic Wireless LAN Security   Describe the wireless protocols. The description will include a description of 802.1x, a comparison of WPA and WPA2 as well as comparison of TKIP and AES
Explain the Components and Operations of Basic Wireless LAN Security   Describe how to secure a wireless LAN from the key security threats
Configure and Verify Basic Wireless LAN Access   Configure a wireless access point
Configure and Verify Basic Wireless LAN Access   Configure a wireless NIC
Configure and Troubleshoot Wireless Client Access   Describe how to solve access point firmware issues
Configure and Troubleshoot Wireless Client Access   Describe how to solve incorrect channel settings
Configure and Troubleshoot Wireless Client Access   Describe how to solve common RF interference issues
Configure and Troubleshoot Wireless Client Access   Describe how to correct antenna misplacement
Configure and Troubleshoot Wireless Client Access   Describe how to solve the common problems associated with wireless LAN encryption types
Configure and Troubleshoot Wireless Client Access   Describe how to solve authentication problems associated with wireless LANs
Summary Wireless LANs use standards such as IEEE 802.11a IEEE 802.11b IEEE 802.11g IEEE 802.11n Basic Service set Mobile clients use a single access point for connectivity Extended service set Multiple access point that share an SSID
Summary WLAN security practices/methods include MAC address filtering SSID making Implementing WPA2 Configuration of wireless NIC and access point Configure both of them the same way SSID Ensure that the latest firmware is installed Troubleshooting WLANs include doing the following: Check channel setting Check for interference
Ìý

More Related Content

Exploration lan switching_chapter7

  • 1. Configure a Wireless Router LAN Switching and Wireless – Chapter 7
  • 2. Objectives Describe the components and operations of basic wireless LAN topologies. Describe the components and operations of basic wireless LAN security. Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.
  • 3. Explain the Components and Operations of Basic Wireless LAN Topologies Describe why wireless LANs are a popular choice for small business LAN implementations
  • 4. Explain the Components and Operations of Basic Wireless LAN Topologies Describe the 802.11 wireless standards
  • 5. Explain the Components and Operations of Basic Wireless LAN Topologies Describe the components of a 802.11-based wireless infrastructure
  • 6. Explain the Components and Operations of Basic Wireless LAN Topologies Describe how wireless networks operate
  • 7. Explain the Components and Operations of Basic Wireless LAN Topologies Describe how to plan a wireless LAN
  • 8. Explain the Components and Operations of Basic Wireless LAN Security Describe the threats to wireless LAN security
  • 9. Explain the Components and Operations of Basic Wireless LAN Security Describe the wireless protocols. The description will include a description of 802.1x, a comparison of WPA and WPA2 as well as comparison of TKIP and AES
  • 10. Explain the Components and Operations of Basic Wireless LAN Security Describe how to secure a wireless LAN from the key security threats
  • 11. Configure and Verify Basic Wireless LAN Access Configure a wireless access point
  • 12. Configure and Verify Basic Wireless LAN Access Configure a wireless NIC
  • 13. Configure and Troubleshoot Wireless Client Access Describe how to solve access point firmware issues
  • 14. Configure and Troubleshoot Wireless Client Access Describe how to solve incorrect channel settings
  • 15. Configure and Troubleshoot Wireless Client Access Describe how to solve common RF interference issues
  • 16. Configure and Troubleshoot Wireless Client Access Describe how to correct antenna misplacement
  • 17. Configure and Troubleshoot Wireless Client Access Describe how to solve the common problems associated with wireless LAN encryption types
  • 18. Configure and Troubleshoot Wireless Client Access Describe how to solve authentication problems associated with wireless LANs
  • 19. Summary Wireless LANs use standards such as IEEE 802.11a IEEE 802.11b IEEE 802.11g IEEE 802.11n Basic Service set Mobile clients use a single access point for connectivity Extended service set Multiple access point that share an SSID
  • 20. Summary WLAN security practices/methods include MAC address filtering SSID making Implementing WPA2 Configuration of wireless NIC and access point Configure both of them the same way SSID Ensure that the latest firmware is installed Troubleshooting WLANs include doing the following: Check channel setting Check for interference
  • 21. Ìý

Editor's Notes

  1. Graphic 7.1.1.2
  2. Graphic 7.1.2.1
  3. Graphics 7.1.3.1 & 7.1.3.3
  4. Graphic 7.1.4.2
  5. Graphic 7.1.5.1
  6. Graphics 7.2.1.2, 7.2.1.1, 7.2.1.3
  7. Graphic 7.2.2.1 If space permits use the following graphic 7.2.2.2 & 7.2.2.3
  8. Graphic 7.2.3.1
  9. Graphics 7.3.1.1 thru 7.3.1.3 (if you can’t do all of them then just do the first one from each page)
  10. Graphics 7.3.2.2
  11. Graphic 7.4.1.1 & 7.4.1.2
  12. Graphic 7.4.2.1
  13. Graphic 7.4.3.1
  14. Graphic 7.4.4.1
  15. Graphic 7.4.4.1
  16. Graphic 7.4.5.1