Top Banner
Estableciendo un WLAN COMP 417
26

Estableciendo un WLAN

Jan 22, 2016

Download

Documents

yin

Estableciendo un WLAN. COMP 417. Comunicación con el AP. Conección al WLAN. Site Information. Identificador del network. Wireless mode. Canal de comunicación. Modo de seguridad. MAC Address. Monitoreo. Status del network. Right-click sobre el icono del network. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Estableciendo un WLAN

Estableciendo un WLAN

COMP 417

Page 2: Estableciendo un WLAN

Comunicación con el AP

Page 3: Estableciendo un WLAN

Conección al WLAN

Page 4: Estableciendo un WLAN

Site Information

Identificador del network

Wireless mode

Canal de comunicación

Modo de seguridadMAC Address

Page 5: Estableciendo un WLAN

Monitoreo

Status del network

Page 6: Estableciendo un WLAN

Right-click sobre el icono del network

Page 7: Estableciendo un WLAN

Solucionando problemas de conección

Page 8: Estableciendo un WLAN

Conectando el host al network

Page 9: Estableciendo un WLAN

Status del network

Page 10: Estableciendo un WLAN

Status del network

Page 11: Estableciendo un WLAN

Status del network

Page 12: Estableciendo un WLAN

Falta de connección

Page 13: Estableciendo un WLAN

Pasos para lograr establecer conección con el Access Point (AP)

Page 14: Estableciendo un WLAN
Page 15: Estableciendo un WLAN
Page 16: Estableciendo un WLAN
Page 17: Estableciendo un WLAN
Page 18: Estableciendo un WLAN

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by the key of 10 or 26 hexadecimal digits, is widely in use and is often the first security choice presented to users by router configuration tools

802.11i (WPA and WPA2)The recommended solution to WEP security problems is to switch to WPA2. WPA was an intermediate solution for hardware that could not support WPA2, but it has been cracked. Both WPA and WPA2 are much more secure than WEP. To add support for WPA or WPA2, some old Wi-Fi access points might need to be replaced or have their firmware upgraded. WPA was designed as an interim software-implementable solution for WEP that could forestall immediate deployment of new hardware. However, TKIP (the basis of WPA) has reached the end of its designed lifetime, has been broken, and has been deprecated in the next full release of the 802.11 standard.

Page 19: Estableciendo un WLAN

WEP (Wired Equivalent Privacy )

• Although its name implies that it is as secure as a wired connection, WEP has been demonstrated to have numerous flaws and has been deprecated in favor of newer standards such as WPA2. In 2003 the Wi-Fi Alliance announced that WEP had been superseded by Wi-Fi Protected Access (WPA). Wi-Fi Protected Access (WPA).

Page 20: Estableciendo un WLAN
Page 21: Estableciendo un WLAN

TKIP

• Temporal Key Integrity Protocol or TKIP is a security protocol used in the IEEE 802.11 wireless networking standard. TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance as a solution to replace WEP without requiring the replacement of legacy hardware. This was necessary because the breaking of WEP had left WiFi networks without viable link-layer security, and a solution was required for already deployed hardware.

Page 22: Estableciendo un WLAN

Advanced Encryption Standard

– Advanced Encryption Standard process, the process used in choosing an algorithm for standardization as AES

Page 23: Estableciendo un WLAN
Page 24: Estableciendo un WLAN
Page 25: Estableciendo un WLAN
Page 26: Estableciendo un WLAN

Firewalls• A firewall can either be software-based or hardware-based and is used to help

keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted.

• Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.