O'Reilly logo

CCNA® Wireless Study Guide by Todd Lammle

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Configuring Wireless Security on the CUWN

THE CCNA WIRELESS EXAM TOPICS COVERED IN THIS CHAPTER ARE:

  • Implement basic WLAN Security

    • Describe the general framework of wireless security and security components (authentication, encryption, MFP, IPS)

    • Describe and configure authentication methods (Guest, PSK, 802.1X, WPA/WPA2 with EAP- TLS, EAP-FAST, PEAP, LEAP)

    • Describe and configure encryption methods (WPA/WPA2 with TKIP, AES)

    • Describe and configure the different sources of authentication (PSK, EAP-local or -external, RADIUS)

Configuring Wireless Security on the CUWN

Note

To find dynamic updates to this chapter, please go to www.lammle.com or www.sybex.com/go/ccnawireless.

Security and the Connection Process

The process wireless clients go through when they connect to an AP and gain access to the network is a consistent one that consists of four phases. You can see the footprints of these phases if you check out the logs on the AP or the controller, or if you're viewing status fields in packet captures. These phases are:

Start

The first phase involves the initial connection between the client and the AP. It's also when Layer 2 security mechanisms like None, Static WEP, 802.1X, WPA, and WPA2 come into play. If these mechanisms are employed and in place, the client will be forced to enter the appropriate password or have the required certificates or smart card in order to proceed and successfully make the connection.

DHCP

This phase ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required