1 Company Confidential Fluke Networks OptiView Wireless Network Analyzer Bringing the power of OptiView to Wireless LANS.

Slides:



Advertisements
Similar presentations
Wireless LAN Security Understanding and Preventing Network Attacks.
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Altai Certification Training Operation & Maintenance
Network Instruments Troubleshooting Techniques. What to look for in network monitoring solutions… Key Elements Real Time Statistics Visual Network Traffic.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Fluke Networks Enterprise Solutions for WAN Enterprise Monitoring And Troubleshooting Tools.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
VoIP Packets In the Air and Over the Wire J. Scott Haugdahl CTO
Wireless Infrastructures Wireless. Wireless Infrastructures Wireless LAN Predominantly IEEE A, B, G, N Wireless MAN WiMax and its.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
High Performance, Easy to Deploy Wireless. Agenda Foundry Key Differentiators Business Value Product Overview Questions.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networking.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Basic Wireless Concepts & Configuration Chapter.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Presented by: Dr. Munam Ali Shah
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Fluke Networks N E T W O R KS U P E RV I S I O N.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
© BV Fluke Networks N E T W O R K S U P E RV I S I O N.
Lecture 24 Wireless Network Security
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Chapter-7 Basic Wireless Concepts and Configuration.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Understand Wireless Security LESSON Security Fundamentals.
Wireless Ethernet Programming
OptiView™ XG Network Analysis Tablet
Methods of Securing LANs
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Wireless Local Area Network (WLAN)
Wireless LAN Security 4.3 Wireless LAN Security.
Configure a Wireless Router
Configure a Wireless Router
LM 5. Wireless Network Security
Presentation transcript:

1 Company Confidential Fluke Networks OptiView Wireless Network Analyzer Bringing the power of OptiView to Wireless LANS

2 Company Confidential Fluke Networks OptiView INA Wireless Solution Complete Portable WLAN Maintenance Tool Design: Site survey tools Deployment: Network Verification tools, tests Troubleshooting: Connectivity and performance test tools Monitoring: Security, network performance

3 Company Confidential Wireless Features (1) Heterogeneous Networks a/b/g Dual band, tri-mode card Continuous scanning through all channels Identify use of illegal channels based on country code settings

4 Company Confidential Wireless Features (2) Security Wi-Fi Protected Access –802.11x/EAP Authentication –Temporal Key Integrity Protocol (TKIP) dynamic key encryption WEP LEAP PEAP Rogue Detection (authorization list), locate tool Identify unsecured devices

5 Company Confidential Wireless Features (1) AutoTest – Network Overview Quick visibility into the state and health of the WLANs Inventory, channel overview, problems detected, utilization/top talkers, signal quality, rogue devices, unprotected devices Discovery (active, passive) Access Points, Bridges, ad hoc devices, mobile clients Configuration, statistics details for each device

6 Company Confidential Wireless Features (2) Channel Analysis (Quality, Health) Continuous channel scan for a/b/g networks AP/Client distribution per channel, flag unsecured channels, utilization Statistics: signal strength, packet stats, Tx/Rx & error rates

7 Company Confidential Wireless Features (3) WLAN Statistics, Traffic Utilization/Errors - network, channel, device by packet type Protocols discovered on the network/AP (packet count, % utilization) Top talkers per network, per channel, per protocol (packet count, % utilization)

8 Company Confidential Wireless Features (4) Site Survey Tool –Used to verify design of WLAN, troubleshooting –Network reading from specific locations –Key Metrics: signal strength (db, %), % retries, % errors, % utilization, –Multiple instances are stored; baseline for troubleshooting

9 Company Confidential Wireless Features (5) Packet Capture/Decode –Filters on MAC and packet type (mgmt, control, data, beacon) –Fluke Networks (.CAP) format –Improved Wireless Decodes Other Tools –Link, Ping, Key device Ping, Throughput, Reporting, MIB Browser, Logon

10 Company Confidential OptiView Wireless Network Analyzer Demo

11 Company Confidential Front Page Network Details Discovered Networks Network Summary Network Health

12 Company Confidential Front Page Choice of Channel Statistics

13 Company Confidential Channel Analysis b/g a Lower and Middle a Upper and ISM

14 Company Confidential Channel Detail Hyperlinks to tools Associated Clients

15 Company Confidential Network Detail

16 Company Confidential Client Detail

17 Company Confidential Traffic Analysis

18 Company Confidential Top Talkers

19 Company Confidential Site Survey

20 Company Confidential Packet Capture

21 Company Confidential Client-based Tools

22 Company Confidential Locate Tool

23 Company Confidential Settings