Thick v Thin Access Points Lab Last Update 2014.07.12 1.0.0 1Copyright 2014 Kenneth M. Chipps Ph.D. www.chipps.com.

Slides:



Advertisements
Similar presentations
Installing a Wireless Home Network
Advertisements

Simultaneous Dual Band Wireless N Router CY-SWR Frequently asked Questions on CY-SWR1100 Reporting Date : 22-April-2011.
How To Set Up A Wireless Network Using A D-Link Wireless Router
Crack WEP Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
Application Guide For Mesh AP – MAP-3120
DSL-2730B, DSL-2740B, DSL-2750B.
DCS-942L How do I set up and install my DCS-942L
Networking By: Matt Motl… Programmer Brent Everson… Programming Mentor.
DAP-1520 FAQ’s Wireless AC750 Dual Band Range Extender.
Microsoft Virtualization Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Crack WPA Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
DNR-322L & DNR-326.
DSL-2870B How to Change ADSL Username and Password in your modem router How to Change Wireless Channel in your modem router How to Open Ports in your modem.
Choose a category: Install Episys Install Accessories Synergent Confidential Episys Version Synergent 2008Download latest guides from:
DVG-N5402SP.
DHP-306AV & DHP-W306AV. Agenda: How to change Encryption on a DHP-306AV How to change the Device Password on a DHP-306AV What will happen if the Device.
A common error that appears on the copier’s screen is seen here when a scan to Sharpdesk is not sent to the computer successfully. This guide intends to.
Copyright Kenneth M. Chipps Ph.D. How to Use SNMP to Collect Network Data Last Update
CAREERSOURCE GC BOARD AND CENTER SETUP FOR USE WITH IPHONE, IPAD, AND SELECT IPODS.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
hotEx RADIUS Manager Installation
How to Build a CAN Last Update Copyright Kenneth M. Chipps PhD 1.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
DIR-510L FAQ’s Wi-Fi AC750 Portable Router and Charger.
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Advanced Networking for DVRs
Wireless Networking 102.
DWR-113 FAQ’s 3G WiFi Router.
Linksys LNKWET11 Setup b Ethernet Converter Step 1. Annotate your Computer’s ethernet IP address. Step 2. Change the Ethernet IP Address/subnet/router.
Slow Web Site Problem Analysis Last Update Copyright 2013 Kenneth M. Chipps Ph.D. 1.
Using the “Setup Assistant” to configure your new Mac Personalizing your new Mac.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Citrix Virtualization Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Geo CE-XM ch 4 Edited 10/14/05 1 The XM is the newest of the rovers, and unlike other units, it comes with software installed on the unit as well as using.
Targeted Training, LLC. APPLYING STYLES DOWNLOAD FREE TRIAL OF ADOBE CONTRIBUTE ADOBE CONTRIBUTE CONNECTION WIZARD ENTERING EDIT MODE WEB PUBLISHING PROCESS.
Step-by-step Here is how simple it is to get on the Mesh...
Xen Virtualization Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Shepard’s Valley Cowboy Church Web Server File Download Problem Analysis Last Update Copyright 2013 Kenneth M. Chipps Ph.D.
DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
Microsoft FrontPage 2003 Illustrated Complete Finalizing a Web Site.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
PC Maintenance: Preparing for A+ Certification Chapter 23: Using a Windows Network.
Hosted Virtualization Lab Last Update Copyright Kenneth M. Chipps Ph.D.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Touch screen function manual Right & left scroll key Room selecting key, Maximal quantity 50. Controlling Target icon Room background image brightness.
How to Setup Scan to on most Sharp Models.
PART 2 INTRODUCTION TO DYNAMIC WEB CONTENT AND PHP.
Installing the ALSMS Software on a Windows Platform Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
Remote Access Using a Netgear DG834 Router 1http://
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
Joomla Awdhesh Kumar Singsys Pte Ltd. What is Joomla? Joomla is an award-winning content management system (CMS), which enables you to build Web sites.
Installing and Configuring Moodle. Download Download latest Windows Install package from Moodle.orgMoodle.org.
Equipment Last Update Copyright Kenneth M. Chipps Ph.D.
Example of a LAN Last Update Copyright 2009 Kenneth M. Chipps Ph.D.
Configuring ALSMS Remote Navigation
Radio Frequency Equipment
Microsoft FrontPage 2003 Illustrated Complete
1. Press the Power button or switch to flip on the printer, if it is turn off. 2. From the Home display screen on the product control panel, click the.
Installing the HP LaserJet Pro 500 color MFP M570 printer software in Windows on a Wireless Network & Wired Network.
BASICS 1 Windows XP.
Welcome and thank you for choosing SharkGate
NETWORK SECURITY LAB Lab 8. Firewall and VPN.
Dell Latitude Laptop Student setup.
NETW-250 Avaya Voice Solutions Last Update
Presentation transcript:

Thick v Thin Access Points Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.

Objective In this lab we will examine the difference between thick and thin access points, as well as the differing methods by which access points can can be managed Copyright 2014 Kenneth M. Chipps Ph.D. 2

Thick Access Point The original form of an access point is a standalone device where all of the decision making and processing goes on in the access point with no consideration of what other access points are doing Copyright 2014 Kenneth M. Chipps Ph.D. 3

Thin Access Point A thin access point has part of its intelligence in the access point and part in a centralized controller This controller can be hardware or software based Copyright 2014 Kenneth M. Chipps Ph.D. 4

Thick or Thin In the beginning of based wireless networks each access point was managed by connecting to them one at a time This worked when there were only a few access points Once large wireless networks began to be installed this became inefficient Copyright 2014 Kenneth M. Chipps Ph.D. 5

Thick or Thin The solution was to move all of the management and decision making to a central point At this central point a hardware based controller was installed All of the traffic went from the AP to the controller and back to the AP Copyright 2014 Kenneth M. Chipps Ph.D. 6

Thick or Thin This approach works for some networks, but it can slow larger, heavily loaded networks We now see more powerful access points or systems where the AP has some processing capacity and some is centralized Copyright 2014 Kenneth M. Chipps Ph.D. 7

Thick or Thin In this lab we will look at both methods, thick and thin access points Copyright 2014 Kenneth M. Chipps Ph.D. 8

Thick Access Point First we will look at a thick access In this example a Linksys WAP610N Connect the AP to the switch Power up the AP You will need to discover the IP address of the AP as it is set to acquire one from a DHCP server Copyright 2014 Kenneth M. Chipps Ph.D. 9

Thick Access Point Log into the access point using a web browser with the IP address Leave the username blank, and enter –admin as the password Copyright 2014 Kenneth M. Chipps Ph.D. 10

Thick Access Point Look around Copyright 2014 Kenneth M. Chipps Ph.D. 11

Thin Access Point Now let’s create a wireless network with two access points and then manage them both from a single program The access points are Ubiquiti UniFi AP units The management program is called UniFi Controller Copyright 2014 Kenneth M. Chipps Ph.D. 12

Thin Access Point When it starts a small window appears Click on the –Launch a Browser to Manage Wireless Network button Copyright 2014 Kenneth M. Chipps Ph.D. 13

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 14

Thin Access Point This will appear Copyright 2014 Kenneth M. Chipps Ph.D. 15

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 16

Thin Access Point Click on the –Proceed anyway button Run the setup process that appears Copyright 2014 Kenneth M. Chipps Ph.D. 17

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 18

Thin Access Point If the access points are not connected to the switch that the computer running the management program is connected to this will appear Copyright 2014 Kenneth M. Chipps Ph.D. 19

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 20

Thin Access Point Hook them up properly If the lights indicate that the NIC and switch are working properly, open port 8443 on the Windows Firewall or just turn it off for now Click the –Refresh button Copyright 2014 Kenneth M. Chipps Ph.D. 21

Thin Access Point This should appear Copyright 2014 Kenneth M. Chipps Ph.D. 22

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 23

Thin Access Point Click –Next Copyright 2014 Kenneth M. Chipps Ph.D. 24

Thin Access Point Enter the –Secure SSID using NETW360 –Security Key using Click –Next Copyright 2014 Kenneth M. Chipps Ph.D. 25

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 26

Thin Access Point Enter –Admin for the Admin Name Enter –password for the Password Copyright 2014 Kenneth M. Chipps Ph.D. 27

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 28

Thin Access Point Click –Next Click –Finish Copyright 2014 Kenneth M. Chipps Ph.D. 29

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 30

Thin Access Point The management login screen will appear Copyright 2014 Kenneth M. Chipps Ph.D. 31

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 32

Thin Access Point Enter the login created above Click –Login This screen will appear Copyright 2014 Kenneth M. Chipps Ph.D. 33

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 34

Thin Access Point We need to change the map as the one shown by default does not represent our building Download the DeVry floor plan from the lab page for this course Click –Add a Map Enter a map name in the Description field Copyright 2014 Kenneth M. Chipps Ph.D. 35

Thin Access Point Click –Upload my own Browse to the location of the file to use as a map Click –Continue Click –Close Copyright 2014 Kenneth M. Chipps Ph.D. 36

Thin Access Point Next we will adjust the scale of the map The DeVry building is how long How could you determine this Once you know, click the –Set Map Scale Button off on the right It looks like a triangle Copyright 2014 Kenneth M. Chipps Ph.D. 37

Thin Access Point Click and hold to draw a line from one side of the building to the other side If you need to redraw the line, just click and hold again to draw a new line Once you’re happy with the line, click –Next Enter the distance that the line represents in the Distance field Copyright 2014 Kenneth M. Chipps Ph.D. 38

Thin Access Point The distance is specified in meters by default but you can switch to feet using the drop-down menu on the right Click –Next Copyright 2014 Kenneth M. Chipps Ph.D. 39

Place Access Points on Map The access points need to be placed on the map Drag the access point icons from the Unplaced APs list on the left to the appropriate locations on the map Copyright 2014 Kenneth M. Chipps Ph.D. 40

Thin Access Point The result should look similar to this Copyright 2014 Kenneth M. Chipps Ph.D. 41

Thin Access Point Copyright 2014 Kenneth M. Chipps Ph.D. 42

Look Around Let’s see what we can do with a system such as this Click on one of the access points Three icons will appear around the access point Click on the one that looks like a gear This shows details on the AP Copyright 2014 Kenneth M. Chipps Ph.D. 43

Look Around Copyright 2014 Kenneth M. Chipps Ph.D. 44

Look Around Close this detail window Click on –Coverage Click on one of the access points An estimate of the coverage provided is show Such as Copyright 2014 Kenneth M. Chipps Ph.D. 45

Look Around Copyright 2014 Kenneth M. Chipps Ph.D. 46

Look Around Continue to see what the program can do Copyright 2014 Kenneth M. Chipps Ph.D. 47

Other Access Points In most cases these days your access points will not be the only ones in the area There will be access points owned by your neighbors These may slow your throughput due to interference, but they do not constitute a security risk Copyright 2014 Kenneth M. Chipps Ph.D. 48

Rogue Access Points Then there are access points that are plugged into your wired network These are a major security risk They must be located and removed This might happen due to an employee needing to add wireless access, but you will not provide it, so the employee does it The organizations security policy should cover this Copyright 2014 Kenneth M. Chipps Ph.D. 49

Rogue Access Points Find the access point and remove it from the network Inform the employee and the supervisor that this is contrary to the security policy Worse is an access point connected to your network by a hacker These are a much more serious problem Copyright 2014 Kenneth M. Chipps Ph.D. 50

Rogue Access Points Most centralized wireless network management programs will attempt to identify and locate these To illustrate this, connect the thick access point to the same switch the two Ubiquiti access points are connected to Let’s see how this program handles this task Copyright 2014 Kenneth M. Chipps Ph.D. 51

Rogue Access Points Click on the –Insight button off on the right side From the dropdown menu on the left side select –Rogue Access Points Copyright 2014 Kenneth M. Chipps Ph.D. 52

Rogue Access Points Copyright 2014 Kenneth M. Chipps Ph.D. 53

Rogue Access Points This will appear showing the access point that has been connected to the wired network, but not added as an approved device Copyright 2014 Kenneth M. Chipps Ph.D. 54

Rogue Access Points Copyright 2014 Kenneth M. Chipps Ph.D. 55

Clear the Configuration Remove the site from the management console Reset all the access points to the factory defaults Copyright 2014 Kenneth M. Chipps Ph.D. 56

Summary In this lab we have seen what thin and thick access points are at a basic level For thick access points, the same concepts apply to larger hardware controller based systems Copyright 2014 Kenneth M. Chipps Ph.D. 57