230 likes | 289 Views
Explore wireless technologies, WLAN components, security measures, and configuration steps for home and small businesses. Learn about encryption, authentication, traffic filtering, and more to ensure a secure wireless network. Before installation, plan layout and security strategies.
E N D
Wireless Technologies Networking for Home and Small Businesses – Chapter 7
Objectives • Describe wireless technologies. • Describe the various components and structure of a WLAN • Describe wireless LAN security issues and mitigation strategies • Configure an integrated wireless access point and a wireless client .
Wireless Technologies • Describe the various wireless technologies and the devices that use them
Wireless Technologies • Describe the benefits and limitations of wireless
Wireless Technologies • Define wireless networks and their boundaries
Components and Structure of a WLAN • Identify and describe wireless LAN standards
Components and Structure of a WLAN • Identify and describe various wireless LAN components.
Components and Structure of a WLAN • Identify and describe various wireless modes and the importance of the SSID • IBSS – ad hoc • BSS - infrastructure
Components and Structure of a WLAN • Describe how wireless channels are used • CSMA/CA: Describe how wireless channels avoid collisions
Components and Structure of a WLAN • Configure an integrated wireless access point
Components and Structure of a WLAN • Configure a wireless client
Wireless LAN Security Issues and Mitigation Strategies • Describe why and how people attack wireless networks
Wireless LAN Security Issues and Mitigation Strategies • Limiting access to a WLAN • MAC address filtering
Wireless LAN Security Issues and Mitigation Strategies • Describe authentication and its purpose
Wireless LAN Security Issues and Mitigation Strategies • Describe encryption and its purpose on a wireless network.
Wireless LAN Security Issues and Mitigation Strategies • Describe traffic filtering and its purpose
Planning the WLAN • Plan for a wireless LAN implementation
Configure an Integrated Wireless Access Point and Wireless Client • Installing and securing the AP
Configure an Integrated Wireless Access Point and Wireless Client • Describe options for backing-up and restoring AP configurations
Configure an Integrated Wireless Access Point and Wireless Client • Identify current version of firmware and describe how to update firmware
Summary • Wireless technologies use electromagnetic radiation in the form of radio signals to carry information between devices. • Ease and convenience of connecting devices wirelessly creates security concerns that need to be addressed. • Before installing wireless devices, an installation plan should be created which includes strategies for layout and security.