Top Banner
LAN Switching and Wireless
56
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

LAN Switching and Wireless

Page 2: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

If you found any mistake’s’ on these slides or if you have any

other questions or comments, please feel free to contact me at:

[email protected] or [email protected]

Linkedin : https://www.linkedin.com/in/AbdelkhalikMosa

Twitter : https://twitter.com/AbdelkhalikMosa

Facebook : https://www.facebook.com/Abdelkhalik.Mosa

Thanks,

Abdelkhalik Mosa

Suez Canal University

Faculty of Computers and Informatics - Ismailia - Egypt

Note …

Page 3: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Introduction

• Wireless technologies use electromagnetic waves to carry information between devices.

• WLANs use radio frequencies (RF) instead of cables at the Physical layer and MAC sub-layer of the Data Link layer.

Page 4: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless LAN Vs. Ethernet LAN

Page 5: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless PAN, LAN, MAN and WAN

PAN : Personal Area NetworksLAN : Local Area NetworksWLAN : Wireless Local Area NetworksMAN : Metropolitan Area NetworksWAN : Wide Area Networks

Page 6: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Introduction: Infrared

• Infrared (IR) is relatively low energy and cannot penetrate through walls or other obstacles.

• A specialized communication port known as an Infrared Direct Access (IrDA) port uses IR to exchange information between devices.

• IR only allows a one-to-one type of connection.

• IR is also used for remote control devices, wireless mice, and wireless keyboards.

• IR generally used for short-range, line-of-sight, communications.

Page 7: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Introduction: Radio Frequency (RF)

• RF waves can penetrate through walls and other obstacles, allowing a much greater range than IR.

• Certain areas of the RF bands have been set aside for use by unlicensed devices such as WLANs, and computer peripherals.

– This includes the 900 MHz, 2.4 GHz, and the 5 GHz frequency ranges. These ranges are known as the ISM bands.

Page 8: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Benefits of Wireless Technology

Page 9: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Limitations of Wireless Technology

Page 10: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless LANs (WLANs)

• 802.11 wireless LANs extend the 802.3 Ethernet LAN infrastructures to provide additional connectivity options.

Page 11: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless LAN Standards

• The governmental agencies in countries, license some frequency bands, leaving some frequency bands unlicensed.

• Licensed bands:

– The most common are AM and FM radio, shortwave radio (for police department communications), and mobile phones.

• Unlicensed frequencies:

– Can be used by all kinds of devices; however, the devices must still conform to the rules set up by the regulatory agency.

• A device using an unlicensed band must use power levels at or below a particular setting so as not to interfere too much with other devices sharing that unlicensed band.

Page 12: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless LAN Standards

• OFDM have faster data rates than DSSS.

• DSSS is simpler and less expensive to implement than OFDM.

Page 13: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless Fidelity (Wi-Fi) Certification

• Wi-Fi Alliance, a global, nonprofit, industry trade association devoted to promoting the growth and acceptance of WLANs.

• The Wi-Fi Alliance is an association of vendors whose objective is to improve the interoperability of products that are based on the 802.11 standard.

• The Wi-Fi logo on a device means it meets standards and should interoperate with other devices of the same standard.

• The three key organizations influencing WLAN standards are:

ITU-R regulates allocation of RF bands.

IEEE specifies how RF is modulated to carry info.

Wi-Fi ensures that vendors make devices that are interoperable.

Page 14: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless Infrastructure Components: Wireless NIC

Wireless NIC encodes a data stream onto an RF signal.

Page 15: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless Infrastructure Components: Wireless Access Points

• An access point is a Layer 2 device that functions like a 802.3 Ethernet hub.

• An access point connects wireless clients to the wired LAN.

• Association is the process by which a client joins an 802.11 network.

• RF signals attenuate as they move away from their point of origin, causing the Hidden node problem.

• One means of resolving the hidden node problem is a CSMA/CAfeature called request to send/clear to send (RTS/CTS).

Page 16: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless Infrastructure Components: Wireless Access Points

• The hidden node problem

Page 17: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless Infrastructure Components: Wireless Routers

• Wireless routers perform the role of access point, Ethernet switch, and router.

Page 18: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configurable Parameters for Wireless Endpoints

Network Modes

Channels

SSID

Page 19: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

802.11 Topologies: Ad Hoc (IBSS)

Independent Basic Service Set (IBSS)

Page 20: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

802.11 Topologies: BSS

Basic Service Set (BSS)

Page 21: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

802.11 Topologies: ESS

Extended Basic Service Set (ESS)

Page 22: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Client and Access Point Association: Beacons

• Beacons: Frames used by the WLAN network to advertise its presence.

Page 23: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Client and Access Point Association: Probes

• Probes: Frames used by WLAN clients to find their networks.

Page 24: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Client and Access Point Association: Authentication

Page 25: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Client and Access Point Association: Association

• Association: The process for establishing the data link between an access point and a WLAN client.

Page 26: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Threats to Wireless Security: Unauthorized Access

• Major categories of threats that lead to unauthorized access:

1. War Drivers:• Find open networks and use them to gain free internet

access.2. Hackers:

• Exploit weak privacy measures to view sensitive WLAN information and even break into WLANs.

3. Employees:• Plug consumer-grade APIs/gateways into company

Ethernet ports to create their own WLANs.

Page 27: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Threats to Wireless Security: Man-in-the-Middle Attacks

Page 28: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Threats to Wireless Security: Denial of Service

Page 29: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Wireless Security Protocol Overview

• Open Authentication: no authentication.

• WEP authentication: was supposed to provide privacy to a link.

Static, crackable, and not scalable.

Cloaking SSIDs and filtering MAC addresses were used.

Page 30: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Authenticating to the Wireless LAN

Page 31: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Authenticating to the Wireless LAN

• EAP is a framework for authenticating network access.

Page 32: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Encryption – TKIP and AES

• TKIP is the encryption method certified as WPA.

It encrypts the Layer 2 payload.

It carries out a message integrity check (MIC) in the encrypted packet which ensures against a message being tampered with.

• AES is the encryption method certified as WPA2.

• PSK or PSK2 with TKIP is the same as WPA.

• PSK or PSK2 with AES is the same as WPA2.

• PSK2, without an encryption method, is the same as WPA2.

Page 33: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Controlling Access to the Wireless LAN

• The concept of depth means having multiple solutions available.

• Implement this three-step approach:

1. SSID cloaking: Disable SSID broadcasts from access points

2. MAC address filtering: Permit or deny clients based on their MAC address

3. WLAN security implementation: WPA or WPA2.

• Neither SSID cloaking nor MAC address filtering are considered a valid means of securing a WLAN for the following reasons:

1. MAC addresses are easily spoofed.

2. SSIDs are easily discovered even they aren’t broadcasted.

Page 34: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configuring the Wireless Access Point

Setu

p

Page 35: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configuring the Wireless Access Point

Man

ag

em

en

t

Page 36: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configuring Basic Wireless Settings

Netw

ork

Mo

de

Page 37: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configuring Basic Wireless Settings

Netw

ork

Nam

e (S

SID

)

Page 38: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configuring Basic Wireless Settings

Rad

io B

an

d

Page 39: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configuring Basic Wireless Settings

Wid

e C

han

nel

Page 40: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configuring Basic Wireless Settings

Sta

nd

ard

Ch

an

nel

Page 41: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configuring Security

• "Personal“ means no AAA server is used.

• "Enterprise“ means a AAA server and EAP authentication is used.

Page 42: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configuring Security

Page 43: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Configuring a wireless NIC

Scan for SSIDsSelecting the Wireless

Security Protocol

Page 44: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Incorrect Channel Settings

Page 45: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Incorrect Channel Settings

Page 46: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Incorrect Channel Settings

Page 47: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Solving RF Interference

Page 48: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Solving RF Interference

Page 49: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Solving RF Interference

Page 50: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Access Point Misplacement

Page 51: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Access Point Misplacement

Page 52: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Access Point Misplacement

Page 53: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Authentication and Encryption

Page 54: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Authentication and Encryption

Page 55: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

WLAN Troubleshooting: Authentication and Encryption

Page 56: LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration