© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.

Slides:



Advertisements
Similar presentations
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Advertisements

Filtering and Security By Mohammad Shanehsaz June 2004.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Implementing Security for Wireless Networks Presenter Name Job Title Company.
Network Access and 802.1X Klaas Wierenga SURFnet
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
802.1x EAP Authentication Protocols
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN Configuring Wireless LANs BCMSN Module 6 Lesson 6.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
DVG-N5402SP.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Wireless Security with 802.1X Copyright 2005 Michael Griego This work is the intellectual property of the author. Permission is granted for this material.
802.1X in Windows Tom Rixom Alfa & Ariss. Overview 802.1X/EAP 802.1X in Windows Tunneled Authentication Certificates in Windows WIFI Client in Windows.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Windows 2003 and 802.1x Secure Wireless Deployments.
Ch. 5 – Access Points. Overview Access Point Connection.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
WIRELESS LAN SECURITY Using
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Wireless Networking.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Basic Wireless Concepts & Configuration Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-3-1 Wireless LANs Implementing a WLAN.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
● Albert Einstein explained it best: ● "You see, wire telegraph is a kind of a very, very long cat. You pull his tail in New York and his head is meowing.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Lab 3-5 Debrief.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Configuring Security Featuers For Wi-Fi (Wireless) Broad Band Access Recently Intelligence agencies have found that terrorists were using unsecured wi-fi.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Samsung Confidential & Proprietary Information Copyright 2003, All Rights Reserved. Page 1 Samsung Wi-Fi (802.11b/a) products June, 2003.
WIFI Gateway Offering Wifi connectivity to Serial device
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Introducing Campus Networks Building Cisco Multilayer Switched Networks (BCMSN) v3.0.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
What’s the difference between Cisco 2960 LAN Base and LAN Lite? The Cisco Catalyst 2960 Switches are the leading Layer 2 edge, providing improved ease.
Wireless Access Point Product Overview
Instructor Materials Chapter 6 Building a Home Network
Wireless Access Point Product Overview
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS
On and Off Premise Secure Access
Configure a Wireless Router
Configure a Wireless Router
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability

© 2006 Cisco Systems, Inc. All rights reserved. Module 6: Implement Wireless Scalability Lesson 6.5: Configuring Encryption and Authentication on Lightweight Access Points

© 2006 Cisco Systems, Inc. All rights reserved. Objectives  Describe how to use the WLAN controller to configure WLAN security options: Open authentication WEP key authentication WPA preshared key Web authentication 802.1x WPA2

© 2006 Cisco Systems, Inc. All rights reserved. WLAN Controllers ProductFeatures Cisco 4400 Series Wireless LAN Controllers For medium-to-large enterprise facilities The Cisco 4402 with 2 Gigabit Ethernet ports supports configurations for 12, 25, and 50 access points Cisco 4404 with 4 Gigabit Ethernet ports supports 100 access points Cisco 2100 Series Wireless LAN Controllers For small to medium-sized businesses or branch offices

© 2006 Cisco Systems, Inc. All rights reserved. WLAN Controller Topology and Network Connections WLAN Controller

© 2006 Cisco Systems, Inc. All rights reserved. Configuring Open Authentication

© 2006 Cisco Systems, Inc. All rights reserved. Configuring Static WEP Key Authentication

© 2006 Cisco Systems, Inc. All rights reserved. Configuring WPA Preshared Key This example shows WPA preshared key.

© 2006 Cisco Systems, Inc. All rights reserved. Web Authentication  Users authenticate via a web browser interface.  Clients using HTTP are automatically directed to a login page: Customizable for logos and text Maximum simultaneous authentication requests—21 Maximum local web authentication users—2500  Generally used for guest access: Data is not secure between the access point and the client.

© 2006 Cisco Systems, Inc. All rights reserved. Configuring Web Authentication

© 2006 Cisco Systems, Inc. All rights reserved. Customizing the Web Login Page

© 2006 Cisco Systems, Inc. All rights reserved x Authentication Microsoft Windows XP clients support only 40-bit or 104-bit dynamic WEP keys.

© 2006 Cisco Systems, Inc. All rights reserved. Configuring WPA with 802.1x This example shows WPA with dynamic keys.

© 2006 Cisco Systems, Inc. All rights reserved. WPA2 This example shows WPA2 with dynamic keys.

© 2006 Cisco Systems, Inc. All rights reserved. Self Check 1.What is web authentication? 2.How is it typically used? 3.Which controller supports web authentication?

© 2006 Cisco Systems, Inc. All rights reserved. Summary  Authentication and encryption are the two primary facilities for securing the WLAN. While encryption using static WEP keys is very vulnerable, WLANs can now be configured to support EAP and the 802.1x standards including LEAP, EAP-FAST, EAP-TLS, PEAP, WPA, and WPA2.

© 2006 Cisco Systems, Inc. All rights reserved. Q and A

© 2006 Cisco Systems, Inc. All rights reserved. Resources  Five Steps to Securing Your Wireless LAN and Preventing Wireless Threats etworking_solutions_white_paper0900aecd8042e23b.shtml  Wireless LAN Security White Paper etworking_solutions_white_paper09186a00800b469f.shtml  Security of the WEP algorithm

© 2006 Cisco Systems, Inc. All rights reserved.