SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
WI-FI
Wireless Fidelity - Basic Introduction

Rogelio Gomez
http://ar.linkedin.com/in/rogeliogomez
Index
• Standards
• Authentication
• Cable Modems with Wi-Fi
Standards
• IEEE 802.11a (5 GHz)
• IEEE 802.11b (2.4 GHz – 11 Mbps)
• IEEE 802.11g (2.4 GHz - 54 Mbps)
• 802.11g+ (100 Mbps)
• Can coexists with a and b
• IEEE 802.11n (2.4 GHz and 5 GHz - MIMO 600 Mbps)

• Also there are private vendors standards
802.11a
• 12 non-overlapping channels – 8 for network 4 for point-

to-point
• No IOP with 802.11b
• 5 Ghz better performance than b/g
• 54 Mbps

802.11b
• 13 channel with overlapping
• 2.4 Ghz
• 11 Mbps
802.11g
• Improves b to reach 54 Mbps
• The total (20 Mhz) 13 overlapping channels
• Back compatible with b in 2.4 Ghz

802.11n
• MIMO Multiple Input Multiple Output (major improvement)
• Channel Bonding to make 40 Mhz channel will have 9

channels available
• The total in 20 Mhz are 13 channels
• Newer and full compatible backwards
Configuration
• SSID
• Name up to 32 characters
• Disable Broadcast
• Multiple SSIDs configuration , when this happens we set a VLAN
for each SSID
Authentication
WEP (10c- 26c 64/128 bit static encryption RC4)
Open: This option doesn’t authenticate the user. It has the
following options:
• No Encryption: Doesn’t encrypt the communication.
• WEP Encryption: Specifies WEP encryption is used. We should select

where to store the WEP key
• Key Source:
• Local: The WEP key is stored in the device. Usually by default. If this option is selected
the key should be generated selecting the length, format and value
• Server: Indicates that the WEP key is dynamically generated by the RADIUS server.
• Both: The Key is stored locally and in the RADIUS Server.

• Auth Server: Indicates that the WEP key is stored in an authentication
server.

WEP Shared Key: The WEP key is pre shared in order to
authenticate the user before the communication starts
Auto: Specifies that both methods are accepted Open y Shared
Key.
Authentication
• WPA/WPA2/WPA
•
•

Vulnerability when activating WPS (Wi-Fi Protected Setup) and WPA
WPA2 supports CCMP encryption (AES – Advanced Encryption Standard)

• WPA/WPA2/WPA Auto Pre-Shared Key PSK: Allows to create a shared key that all clients will

store. With the options:
•
•
•

HEXA key: The key should be 256-bit (64 characters) in hexadecimal.
Key by password: The password must contain between 8-63 ASCII characters.
Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is
1800 seconds. You can also specify 0 to disable key updates.
• Encryption Type: You can choose the following options:
•
•
•

TKIP: TKIP Temporary Key Integrity Protocol generates a key of 128 bit per package using RC4 with a new key per package
AES: Advanced Encryption Standard. Uses CCMP encryption.
Auto: Can select between AES or Temporal Key Integrity Protocol (TKIP) Usually this option uses AES at first if no connection
then it falls back to TKIP

• WPA/WPA2/WPA Authentication Server: Wi-Fi Protected Access (WPA) authentication with a

server. If you enable WPA, WPA2, or WPA authentication, you must also configure the
authentication server.
• After selecting an authentication method, enter authentication server information with the
following:
•

Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is
1800 seconds. You can also specify 0 to disable key updates.
• Encryption Type: Specify the encryption method between the AP and the client:
•
•
•

Auto
TKIP
AES

• The Mixed WPA/WPA2 method usually tries with WPA2 if is not successful it falls back to

WPA. The standard for WPA2 is 802.11i (WPA has no standardization)
Cable Modems with Wi-Fi
• Cisco DPC2525
• Ubee
• Thomson DWG855
• Cisco DPC2420
Cisco DPC2525
• Wireless
• 802.11g con 4 SSIDs
• Wireless Multimedia (WIMM) including Wi-Fi Protected Setup by
button
• Dual Antenna
• Ethernet
• 4 ports
• Firewall
• Parental Control
• Voice
• Upgradeable to SIP
• Codecs G.711, T.38, G.729, BV16
• Codec Encryption AES-128
• Call Features Support (Caller ID, Call Waiting, Call Forwarding, Call
Transfer)
• 2 Voice Ports
Ubee
• Wireless
• SSID
• Security
• WPA2-PSK con AES recommended
• Wi-Fi Protected Setup (push button or PIN method)

• 802.11 Frequency 802.11b/g/n 2.4 GHz some support 5 GHz. Can select the

channels or just use AUTO
• RSSI Receive Signal Strength Indicator: Indicates the signal level for each
connected device

• Firewall
• DMZ
• Port Scan Detection
• Filter Cookies
• IP Flood attack
• Content Filter
• DHCP
• Port Forwarding
Thomson DWG855
• Voice
• 2 RJ11
• RAS & 56 bit encryption security
• V.90 fax
• Wireless
• SSID
• Name – Open - Close

•
•
•
•
•

Channel (11 channels - the TWG850 13 channels
Enable / Disable
Security (WPA/WPA2/WEP/802.1x Radius)
Access Control (MAC allow/restric)
Advanced (Proprietary Air Interface, Rate, Output Power, Beacon
interval)
• Bridging WDS (Wireless Distribution System) allows to interconnect
APs options: Enable/Disable/Remote Bridges MAC(up to 4)
Cisco DPC2420
• Voice
• 2 Ports
• Ethernet
• 1 Port
• Wireless
• Basic (up to 11 channels– SSID)
• Security (WEP/WPA/WPA2 - WPS)
• Advanced (data rates and thresholds)
• Access Control (filter by MAC, SSID broadcast, Open system o PSK)
• WDS Wireless Distribution System
• Parental Control
• User Setup (create users profile and apply access rules to those users)
• Basic Rules (create rules and block content information)
• Time of the Day Rules (block all traffic in certain time)
• Local Log
• Firewall
• Web Pages filtering
• Event Logging & email config for Alerts
• Basic Setting (Network config, time NTP, Mngmt IP, Network)
• Advanced Settings
• IP Address Filtering
• MAC Address Filtering
• Port Filtering
• Port Forwarding
• DDNS (Dynamic DNS – Requires previous subscription to a provider of DDNS – user password host)
• Port Triggers (deactivate port when no activity)
• DMZ Host (Set IP visibity from outside by passing the firewall)
• VPN Termination (configuration and protocol control and VPN tunnels)
THANKS!

Weitere ähnliche Inhalte

Was ist angesagt?

CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network MonitoringNetworkel
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - EnglishAdhie Lesmana
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to pointNetworkel
 
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)Arif Hossen
 
CCNA Routing Basics
CCNA Routing BasicsCCNA Routing Basics
CCNA Routing BasicsNetworkel
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLSSam Bowne
 
Network Access - CCNA 200-125 Training
Network Access - CCNA 200-125 TrainingNetwork Access - CCNA 200-125 Training
Network Access - CCNA 200-125 TrainingNetworkel
 
CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)Networkel
 
CCNA eBGP Protocol
CCNA eBGP ProtocolCCNA eBGP Protocol
CCNA eBGP ProtocolNetworkel
 
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2DrayTek Corp.
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASADhruv Sharma
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Setia Juli Irzal Ismail
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterKHNOG
 
CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)Networkel
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies toolsgocybersec
 
CCNA Inter VLAN Routing
CCNA Inter VLAN RoutingCCNA Inter VLAN Routing
CCNA Inter VLAN RoutingNetworkel
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)Networkel
 

Was ist angesagt? (20)

CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network Monitoring
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to point
 
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
CCNA Routing Basics
CCNA Routing BasicsCCNA Routing Basics
CCNA Routing Basics
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLS
 
Network Access - CCNA 200-125 Training
Network Access - CCNA 200-125 TrainingNetwork Access - CCNA 200-125 Training
Network Access - CCNA 200-125 Training
 
CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)
 
CCNA eBGP Protocol
CCNA eBGP ProtocolCCNA eBGP Protocol
CCNA eBGP Protocol
 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
 
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASA
 
Mikrotik advanced
Mikrotik advancedMikrotik advanced
Mikrotik advanced
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik Router
 
CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
CCNA Inter VLAN Routing
CCNA Inter VLAN RoutingCCNA Inter VLAN Routing
CCNA Inter VLAN Routing
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)
 

Andere mochten auch

Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Syed Ariful Islam Emon
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Syed Ariful Islam Emon
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocolTom Hanstead
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-FiBhushan Jadhav
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocolsbhavanatmithun
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsAbdelkhalik Mosa
 

Andere mochten auch (9)

Wi fi network
Wi fi networkWi fi network
Wi fi network
 
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
 
Wi fi
Wi fiWi fi
Wi fi
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 

Ähnlich wie Wi Fi Technology - What you don't see you don't care...

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Wireless ac easy upgrader
Wireless ac easy upgraderWireless ac easy upgrader
Wireless ac easy upgradersonn jita
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringeceb9198
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologiesInocentshuja Ahmad
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?Tom Isaacson
 
Ac1750 dual band wireless router
Ac1750 dual band wireless routerAc1750 dual band wireless router
Ac1750 dual band wireless routersonn jita
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APEmbedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APAhmed El-Arabawy
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.pptxdarlord
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
Sales presentation ECB1200
Sales presentation ECB1200Sales presentation ECB1200
Sales presentation ECB1200EnGenius Europe
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2Tushar Anand
 
wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)Azad Kaki
 

Ähnlich wie Wi Fi Technology - What you don't see you don't care... (20)

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Wireless ac easy upgrader
Wireless ac easy upgraderWireless ac easy upgrader
Wireless ac easy upgrader
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
Ac1750 dual band wireless router
Ac1750 dual band wireless routerAc1750 dual band wireless router
Ac1750 dual band wireless router
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APEmbedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
 
Sales presentation ECB1200
Sales presentation ECB1200Sales presentation ECB1200
Sales presentation ECB1200
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)
 

Mehr von Rogelio Gomez

Evolution of the species enhanced
Evolution of the species enhancedEvolution of the species enhanced
Evolution of the species enhancedRogelio Gomez
 
Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2Rogelio Gomez
 
White paper La video Revolucion
White paper   La video RevolucionWhite paper   La video Revolucion
White paper La video RevolucionRogelio Gomez
 
White paper La era de servicios en la nube
White paper La era de servicios en la nubeWhite paper La era de servicios en la nube
White paper La era de servicios en la nubeRogelio Gomez
 
Cloud Storage De La Mejor Manera
Cloud Storage De La Mejor ManeraCloud Storage De La Mejor Manera
Cloud Storage De La Mejor ManeraRogelio Gomez
 
Las mejores practicas para diseñar comunicaciones en IP en un Contact Center
Las mejores practicas para  diseñar  comunicaciones en IP en un Contact CenterLas mejores practicas para  diseñar  comunicaciones en IP en un Contact Center
Las mejores practicas para diseñar comunicaciones en IP en un Contact CenterRogelio Gomez
 
EPC Introduction & Market
EPC Introduction & MarketEPC Introduction & Market
EPC Introduction & MarketRogelio Gomez
 

Mehr von Rogelio Gomez (9)

Evolution of the species enhanced
Evolution of the species enhancedEvolution of the species enhanced
Evolution of the species enhanced
 
Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2
 
White paper La video Revolucion
White paper   La video RevolucionWhite paper   La video Revolucion
White paper La video Revolucion
 
White paper La era de servicios en la nube
White paper La era de servicios en la nubeWhite paper La era de servicios en la nube
White paper La era de servicios en la nube
 
Cloud Storage De La Mejor Manera
Cloud Storage De La Mejor ManeraCloud Storage De La Mejor Manera
Cloud Storage De La Mejor Manera
 
Las mejores practicas para diseñar comunicaciones en IP en un Contact Center
Las mejores practicas para  diseñar  comunicaciones en IP en un Contact CenterLas mejores practicas para  diseñar  comunicaciones en IP en un Contact Center
Las mejores practicas para diseñar comunicaciones en IP en un Contact Center
 
EPC Introduction & Market
EPC Introduction & MarketEPC Introduction & Market
EPC Introduction & Market
 
GPON Introduction
GPON IntroductionGPON Introduction
GPON Introduction
 
IMS Presentation
IMS PresentationIMS Presentation
IMS Presentation
 

Kürzlich hochgeladen

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 

Kürzlich hochgeladen (20)

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 

Wi Fi Technology - What you don't see you don't care...

  • 1. WI-FI Wireless Fidelity - Basic Introduction Rogelio Gomez http://ar.linkedin.com/in/rogeliogomez
  • 3. Standards • IEEE 802.11a (5 GHz) • IEEE 802.11b (2.4 GHz – 11 Mbps) • IEEE 802.11g (2.4 GHz - 54 Mbps) • 802.11g+ (100 Mbps) • Can coexists with a and b • IEEE 802.11n (2.4 GHz and 5 GHz - MIMO 600 Mbps) • Also there are private vendors standards
  • 4. 802.11a • 12 non-overlapping channels – 8 for network 4 for point- to-point • No IOP with 802.11b • 5 Ghz better performance than b/g • 54 Mbps 802.11b • 13 channel with overlapping • 2.4 Ghz • 11 Mbps
  • 5. 802.11g • Improves b to reach 54 Mbps • The total (20 Mhz) 13 overlapping channels • Back compatible with b in 2.4 Ghz 802.11n • MIMO Multiple Input Multiple Output (major improvement) • Channel Bonding to make 40 Mhz channel will have 9 channels available • The total in 20 Mhz are 13 channels • Newer and full compatible backwards
  • 6. Configuration • SSID • Name up to 32 characters • Disable Broadcast • Multiple SSIDs configuration , when this happens we set a VLAN for each SSID
  • 7. Authentication WEP (10c- 26c 64/128 bit static encryption RC4) Open: This option doesn’t authenticate the user. It has the following options: • No Encryption: Doesn’t encrypt the communication. • WEP Encryption: Specifies WEP encryption is used. We should select where to store the WEP key • Key Source: • Local: The WEP key is stored in the device. Usually by default. If this option is selected the key should be generated selecting the length, format and value • Server: Indicates that the WEP key is dynamically generated by the RADIUS server. • Both: The Key is stored locally and in the RADIUS Server. • Auth Server: Indicates that the WEP key is stored in an authentication server. WEP Shared Key: The WEP key is pre shared in order to authenticate the user before the communication starts Auto: Specifies that both methods are accepted Open y Shared Key.
  • 8. Authentication • WPA/WPA2/WPA • • Vulnerability when activating WPS (Wi-Fi Protected Setup) and WPA WPA2 supports CCMP encryption (AES – Advanced Encryption Standard) • WPA/WPA2/WPA Auto Pre-Shared Key PSK: Allows to create a shared key that all clients will store. With the options: • • • HEXA key: The key should be 256-bit (64 characters) in hexadecimal. Key by password: The password must contain between 8-63 ASCII characters. Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is 1800 seconds. You can also specify 0 to disable key updates. • Encryption Type: You can choose the following options: • • • TKIP: TKIP Temporary Key Integrity Protocol generates a key of 128 bit per package using RC4 with a new key per package AES: Advanced Encryption Standard. Uses CCMP encryption. Auto: Can select between AES or Temporal Key Integrity Protocol (TKIP) Usually this option uses AES at first if no connection then it falls back to TKIP • WPA/WPA2/WPA Authentication Server: Wi-Fi Protected Access (WPA) authentication with a server. If you enable WPA, WPA2, or WPA authentication, you must also configure the authentication server. • After selecting an authentication method, enter authentication server information with the following: • Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is 1800 seconds. You can also specify 0 to disable key updates. • Encryption Type: Specify the encryption method between the AP and the client: • • • Auto TKIP AES • The Mixed WPA/WPA2 method usually tries with WPA2 if is not successful it falls back to WPA. The standard for WPA2 is 802.11i (WPA has no standardization)
  • 9. Cable Modems with Wi-Fi • Cisco DPC2525 • Ubee • Thomson DWG855 • Cisco DPC2420
  • 10. Cisco DPC2525 • Wireless • 802.11g con 4 SSIDs • Wireless Multimedia (WIMM) including Wi-Fi Protected Setup by button • Dual Antenna • Ethernet • 4 ports • Firewall • Parental Control • Voice • Upgradeable to SIP • Codecs G.711, T.38, G.729, BV16 • Codec Encryption AES-128 • Call Features Support (Caller ID, Call Waiting, Call Forwarding, Call Transfer) • 2 Voice Ports
  • 11. Ubee • Wireless • SSID • Security • WPA2-PSK con AES recommended • Wi-Fi Protected Setup (push button or PIN method) • 802.11 Frequency 802.11b/g/n 2.4 GHz some support 5 GHz. Can select the channels or just use AUTO • RSSI Receive Signal Strength Indicator: Indicates the signal level for each connected device • Firewall • DMZ • Port Scan Detection • Filter Cookies • IP Flood attack • Content Filter • DHCP • Port Forwarding
  • 12. Thomson DWG855 • Voice • 2 RJ11 • RAS & 56 bit encryption security • V.90 fax • Wireless • SSID • Name – Open - Close • • • • • Channel (11 channels - the TWG850 13 channels Enable / Disable Security (WPA/WPA2/WEP/802.1x Radius) Access Control (MAC allow/restric) Advanced (Proprietary Air Interface, Rate, Output Power, Beacon interval) • Bridging WDS (Wireless Distribution System) allows to interconnect APs options: Enable/Disable/Remote Bridges MAC(up to 4)
  • 13. Cisco DPC2420 • Voice • 2 Ports • Ethernet • 1 Port • Wireless • Basic (up to 11 channels– SSID) • Security (WEP/WPA/WPA2 - WPS) • Advanced (data rates and thresholds) • Access Control (filter by MAC, SSID broadcast, Open system o PSK) • WDS Wireless Distribution System • Parental Control • User Setup (create users profile and apply access rules to those users) • Basic Rules (create rules and block content information) • Time of the Day Rules (block all traffic in certain time) • Local Log • Firewall • Web Pages filtering • Event Logging & email config for Alerts • Basic Setting (Network config, time NTP, Mngmt IP, Network) • Advanced Settings • IP Address Filtering • MAC Address Filtering • Port Filtering • Port Forwarding • DDNS (Dynamic DNS – Requires previous subscription to a provider of DDNS – user password host) • Port Triggers (deactivate port when no activity) • DMZ Host (Set IP visibity from outside by passing the firewall) • VPN Termination (configuration and protocol control and VPN tunnels)