SlideShare une entreprise Scribd logo
1  sur  14
WI-FI
Wireless Fidelity - Basic Introduction

Rogelio Gomez
http://ar.linkedin.com/in/rogeliogomez
Index
• Standards
• Authentication
• Cable Modems with Wi-Fi
Standards
• IEEE 802.11a (5 GHz)
• IEEE 802.11b (2.4 GHz – 11 Mbps)
• IEEE 802.11g (2.4 GHz - 54 Mbps)
• 802.11g+ (100 Mbps)
• Can coexists with a and b
• IEEE 802.11n (2.4 GHz and 5 GHz - MIMO 600 Mbps)

• Also there are private vendors standards
802.11a
• 12 non-overlapping channels – 8 for network 4 for point-

to-point
• No IOP with 802.11b
• 5 Ghz better performance than b/g
• 54 Mbps

802.11b
• 13 channel with overlapping
• 2.4 Ghz
• 11 Mbps
802.11g
• Improves b to reach 54 Mbps
• The total (20 Mhz) 13 overlapping channels
• Back compatible with b in 2.4 Ghz

802.11n
• MIMO Multiple Input Multiple Output (major improvement)
• Channel Bonding to make 40 Mhz channel will have 9

channels available
• The total in 20 Mhz are 13 channels
• Newer and full compatible backwards
Configuration
• SSID
• Name up to 32 characters
• Disable Broadcast
• Multiple SSIDs configuration , when this happens we set a VLAN
for each SSID
Authentication
WEP (10c- 26c 64/128 bit static encryption RC4)
Open: This option doesn’t authenticate the user. It has the
following options:
• No Encryption: Doesn’t encrypt the communication.
• WEP Encryption: Specifies WEP encryption is used. We should select

where to store the WEP key
• Key Source:
• Local: The WEP key is stored in the device. Usually by default. If this option is selected
the key should be generated selecting the length, format and value
• Server: Indicates that the WEP key is dynamically generated by the RADIUS server.
• Both: The Key is stored locally and in the RADIUS Server.

• Auth Server: Indicates that the WEP key is stored in an authentication
server.

WEP Shared Key: The WEP key is pre shared in order to
authenticate the user before the communication starts
Auto: Specifies that both methods are accepted Open y Shared
Key.
Authentication
• WPA/WPA2/WPA
•
•

Vulnerability when activating WPS (Wi-Fi Protected Setup) and WPA
WPA2 supports CCMP encryption (AES – Advanced Encryption Standard)

• WPA/WPA2/WPA Auto Pre-Shared Key PSK: Allows to create a shared key that all clients will

store. With the options:
•
•
•

HEXA key: The key should be 256-bit (64 characters) in hexadecimal.
Key by password: The password must contain between 8-63 ASCII characters.
Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is
1800 seconds. You can also specify 0 to disable key updates.
• Encryption Type: You can choose the following options:
•
•
•

TKIP: TKIP Temporary Key Integrity Protocol generates a key of 128 bit per package using RC4 with a new key per package
AES: Advanced Encryption Standard. Uses CCMP encryption.
Auto: Can select between AES or Temporal Key Integrity Protocol (TKIP) Usually this option uses AES at first if no connection
then it falls back to TKIP

• WPA/WPA2/WPA Authentication Server: Wi-Fi Protected Access (WPA) authentication with a

server. If you enable WPA, WPA2, or WPA authentication, you must also configure the
authentication server.
• After selecting an authentication method, enter authentication server information with the
following:
•

Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is
1800 seconds. You can also specify 0 to disable key updates.
• Encryption Type: Specify the encryption method between the AP and the client:
•
•
•

Auto
TKIP
AES

• The Mixed WPA/WPA2 method usually tries with WPA2 if is not successful it falls back to

WPA. The standard for WPA2 is 802.11i (WPA has no standardization)
Cable Modems with Wi-Fi
• Cisco DPC2525
• Ubee
• Thomson DWG855
• Cisco DPC2420
Cisco DPC2525
• Wireless
• 802.11g con 4 SSIDs
• Wireless Multimedia (WIMM) including Wi-Fi Protected Setup by
button
• Dual Antenna
• Ethernet
• 4 ports
• Firewall
• Parental Control
• Voice
• Upgradeable to SIP
• Codecs G.711, T.38, G.729, BV16
• Codec Encryption AES-128
• Call Features Support (Caller ID, Call Waiting, Call Forwarding, Call
Transfer)
• 2 Voice Ports
Ubee
• Wireless
• SSID
• Security
• WPA2-PSK con AES recommended
• Wi-Fi Protected Setup (push button or PIN method)

• 802.11 Frequency 802.11b/g/n 2.4 GHz some support 5 GHz. Can select the

channels or just use AUTO
• RSSI Receive Signal Strength Indicator: Indicates the signal level for each
connected device

• Firewall
• DMZ
• Port Scan Detection
• Filter Cookies
• IP Flood attack
• Content Filter
• DHCP
• Port Forwarding
Thomson DWG855
• Voice
• 2 RJ11
• RAS & 56 bit encryption security
• V.90 fax
• Wireless
• SSID
• Name – Open - Close

•
•
•
•
•

Channel (11 channels - the TWG850 13 channels
Enable / Disable
Security (WPA/WPA2/WEP/802.1x Radius)
Access Control (MAC allow/restric)
Advanced (Proprietary Air Interface, Rate, Output Power, Beacon
interval)
• Bridging WDS (Wireless Distribution System) allows to interconnect
APs options: Enable/Disable/Remote Bridges MAC(up to 4)
Cisco DPC2420
• Voice
• 2 Ports
• Ethernet
• 1 Port
• Wireless
• Basic (up to 11 channels– SSID)
• Security (WEP/WPA/WPA2 - WPS)
• Advanced (data rates and thresholds)
• Access Control (filter by MAC, SSID broadcast, Open system o PSK)
• WDS Wireless Distribution System
• Parental Control
• User Setup (create users profile and apply access rules to those users)
• Basic Rules (create rules and block content information)
• Time of the Day Rules (block all traffic in certain time)
• Local Log
• Firewall
• Web Pages filtering
• Event Logging & email config for Alerts
• Basic Setting (Network config, time NTP, Mngmt IP, Network)
• Advanced Settings
• IP Address Filtering
• MAC Address Filtering
• Port Filtering
• Port Forwarding
• DDNS (Dynamic DNS – Requires previous subscription to a provider of DDNS – user password host)
• Port Triggers (deactivate port when no activity)
• DMZ Host (Set IP visibity from outside by passing the firewall)
• VPN Termination (configuration and protocol control and VPN tunnels)
THANKS!

Contenu connexe

Tendances

CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network MonitoringNetworkel
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - EnglishAdhie Lesmana
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to pointNetworkel
 
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)Arif Hossen
 
CCNA Routing Basics
CCNA Routing BasicsCCNA Routing Basics
CCNA Routing BasicsNetworkel
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLSSam Bowne
 
Network Access - CCNA 200-125 Training
Network Access - CCNA 200-125 TrainingNetwork Access - CCNA 200-125 Training
Network Access - CCNA 200-125 TrainingNetworkel
 
CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)Networkel
 
CCNA eBGP Protocol
CCNA eBGP ProtocolCCNA eBGP Protocol
CCNA eBGP ProtocolNetworkel
 
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2DrayTek Corp.
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASADhruv Sharma
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Setia Juli Irzal Ismail
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterKHNOG
 
CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)Networkel
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies toolsgocybersec
 
CCNA Inter VLAN Routing
CCNA Inter VLAN RoutingCCNA Inter VLAN Routing
CCNA Inter VLAN RoutingNetworkel
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)Networkel
 

Tendances (20)

CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network Monitoring
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to point
 
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
Network Simulation using Mikrotik Router OS CHR (MUM Presentation)
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
CCNA Routing Basics
CCNA Routing BasicsCCNA Routing Basics
CCNA Routing Basics
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLS
 
Network Access - CCNA 200-125 Training
Network Access - CCNA 200-125 TrainingNetwork Access - CCNA 200-125 Training
Network Access - CCNA 200-125 Training
 
CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)CCNA - VLANs (Virtual Area Network)
CCNA - VLANs (Virtual Area Network)
 
CCNA eBGP Protocol
CCNA eBGP ProtocolCCNA eBGP Protocol
CCNA eBGP Protocol
 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
 
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 2
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASA
 
Mikrotik advanced
Mikrotik advancedMikrotik advanced
Mikrotik advanced
 
Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]Chapter 10 wireless hacking [compatibility mode]
Chapter 10 wireless hacking [compatibility mode]
 
HOTSPOT on MikroTik Router
HOTSPOT on MikroTik RouterHOTSPOT on MikroTik Router
HOTSPOT on MikroTik Router
 
CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)CCNA DHCP (Dynamic Host Control Protocol)
CCNA DHCP (Dynamic Host Control Protocol)
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
CCNA Inter VLAN Routing
CCNA Inter VLAN RoutingCCNA Inter VLAN Routing
CCNA Inter VLAN Routing
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)
 

En vedette

Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Syed Ariful Islam Emon
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Syed Ariful Islam Emon
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocolTom Hanstead
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-FiBhushan Jadhav
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocolsbhavanatmithun
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsAbdelkhalik Mosa
 

En vedette (9)

Wi fi network
Wi fi networkWi fi network
Wi fi network
 
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
 
Wi fi
Wi fiWi fi
Wi fi
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 

Similaire à Wi Fi Technology - What you don't see you don't care...

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Wireless ac easy upgrader
Wireless ac easy upgraderWireless ac easy upgrader
Wireless ac easy upgradersonn jita
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringeceb9198
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologiesInocentshuja Ahmad
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?Tom Isaacson
 
Ac1750 dual band wireless router
Ac1750 dual band wireless routerAc1750 dual band wireless router
Ac1750 dual band wireless routersonn jita
 
lm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptxlm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptxLucintaLuna4
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APEmbedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APAhmed El-Arabawy
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Tutorial and Review TP Link Archer C54.pdf
Tutorial and Review TP Link Archer C54.pdfTutorial and Review TP Link Archer C54.pdf
Tutorial and Review TP Link Archer C54.pdfbamscapri
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.pptxdarlord
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
Sales presentation ECB1200
Sales presentation ECB1200Sales presentation ECB1200
Sales presentation ECB1200EnGenius Europe
 

Similaire à Wi Fi Technology - What you don't see you don't care... (20)

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Wireless ac easy upgrader
Wireless ac easy upgraderWireless ac easy upgrader
Wireless ac easy upgrader
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
Ac1750 dual band wireless router
Ac1750 dual band wireless routerAc1750 dual band wireless router
Ac1750 dual band wireless router
 
lm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptxlm_wireless_security_overview_of_wireless_sec.pptx
lm_wireless_security_overview_of_wireless_sec.pptx
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APEmbedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Tutorial and Review TP Link Archer C54.pdf
Tutorial and Review TP Link Archer C54.pdfTutorial and Review TP Link Archer C54.pdf
Tutorial and Review TP Link Archer C54.pdf
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
 
Sales presentation ECB1200
Sales presentation ECB1200Sales presentation ECB1200
Sales presentation ECB1200
 

Plus de Rogelio Gomez

Evolution of the species enhanced
Evolution of the species enhancedEvolution of the species enhanced
Evolution of the species enhancedRogelio Gomez
 
Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2Rogelio Gomez
 
White paper La video Revolucion
White paper   La video RevolucionWhite paper   La video Revolucion
White paper La video RevolucionRogelio Gomez
 
White paper La era de servicios en la nube
White paper La era de servicios en la nubeWhite paper La era de servicios en la nube
White paper La era de servicios en la nubeRogelio Gomez
 
Cloud Storage De La Mejor Manera
Cloud Storage De La Mejor ManeraCloud Storage De La Mejor Manera
Cloud Storage De La Mejor ManeraRogelio Gomez
 
Las mejores practicas para diseñar comunicaciones en IP en un Contact Center
Las mejores practicas para  diseñar  comunicaciones en IP en un Contact CenterLas mejores practicas para  diseñar  comunicaciones en IP en un Contact Center
Las mejores practicas para diseñar comunicaciones en IP en un Contact CenterRogelio Gomez
 
EPC Introduction & Market
EPC Introduction & MarketEPC Introduction & Market
EPC Introduction & MarketRogelio Gomez
 

Plus de Rogelio Gomez (9)

Evolution of the species enhanced
Evolution of the species enhancedEvolution of the species enhanced
Evolution of the species enhanced
 
Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2Teoría de la evolución mejorada 2
Teoría de la evolución mejorada 2
 
White paper La video Revolucion
White paper   La video RevolucionWhite paper   La video Revolucion
White paper La video Revolucion
 
White paper La era de servicios en la nube
White paper La era de servicios en la nubeWhite paper La era de servicios en la nube
White paper La era de servicios en la nube
 
Cloud Storage De La Mejor Manera
Cloud Storage De La Mejor ManeraCloud Storage De La Mejor Manera
Cloud Storage De La Mejor Manera
 
Las mejores practicas para diseñar comunicaciones en IP en un Contact Center
Las mejores practicas para  diseñar  comunicaciones en IP en un Contact CenterLas mejores practicas para  diseñar  comunicaciones en IP en un Contact Center
Las mejores practicas para diseñar comunicaciones en IP en un Contact Center
 
EPC Introduction & Market
EPC Introduction & MarketEPC Introduction & Market
EPC Introduction & Market
 
GPON Introduction
GPON IntroductionGPON Introduction
GPON Introduction
 
IMS Presentation
IMS PresentationIMS Presentation
IMS Presentation
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 

Wi Fi Technology - What you don't see you don't care...

  • 1. WI-FI Wireless Fidelity - Basic Introduction Rogelio Gomez http://ar.linkedin.com/in/rogeliogomez
  • 3. Standards • IEEE 802.11a (5 GHz) • IEEE 802.11b (2.4 GHz – 11 Mbps) • IEEE 802.11g (2.4 GHz - 54 Mbps) • 802.11g+ (100 Mbps) • Can coexists with a and b • IEEE 802.11n (2.4 GHz and 5 GHz - MIMO 600 Mbps) • Also there are private vendors standards
  • 4. 802.11a • 12 non-overlapping channels – 8 for network 4 for point- to-point • No IOP with 802.11b • 5 Ghz better performance than b/g • 54 Mbps 802.11b • 13 channel with overlapping • 2.4 Ghz • 11 Mbps
  • 5. 802.11g • Improves b to reach 54 Mbps • The total (20 Mhz) 13 overlapping channels • Back compatible with b in 2.4 Ghz 802.11n • MIMO Multiple Input Multiple Output (major improvement) • Channel Bonding to make 40 Mhz channel will have 9 channels available • The total in 20 Mhz are 13 channels • Newer and full compatible backwards
  • 6. Configuration • SSID • Name up to 32 characters • Disable Broadcast • Multiple SSIDs configuration , when this happens we set a VLAN for each SSID
  • 7. Authentication WEP (10c- 26c 64/128 bit static encryption RC4) Open: This option doesn’t authenticate the user. It has the following options: • No Encryption: Doesn’t encrypt the communication. • WEP Encryption: Specifies WEP encryption is used. We should select where to store the WEP key • Key Source: • Local: The WEP key is stored in the device. Usually by default. If this option is selected the key should be generated selecting the length, format and value • Server: Indicates that the WEP key is dynamically generated by the RADIUS server. • Both: The Key is stored locally and in the RADIUS Server. • Auth Server: Indicates that the WEP key is stored in an authentication server. WEP Shared Key: The WEP key is pre shared in order to authenticate the user before the communication starts Auto: Specifies that both methods are accepted Open y Shared Key.
  • 8. Authentication • WPA/WPA2/WPA • • Vulnerability when activating WPS (Wi-Fi Protected Setup) and WPA WPA2 supports CCMP encryption (AES – Advanced Encryption Standard) • WPA/WPA2/WPA Auto Pre-Shared Key PSK: Allows to create a shared key that all clients will store. With the options: • • • HEXA key: The key should be 256-bit (64 characters) in hexadecimal. Key by password: The password must contain between 8-63 ASCII characters. Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is 1800 seconds. You can also specify 0 to disable key updates. • Encryption Type: You can choose the following options: • • • TKIP: TKIP Temporary Key Integrity Protocol generates a key of 128 bit per package using RC4 with a new key per package AES: Advanced Encryption Standard. Uses CCMP encryption. Auto: Can select between AES or Temporal Key Integrity Protocol (TKIP) Usually this option uses AES at first if no connection then it falls back to TKIP • WPA/WPA2/WPA Authentication Server: Wi-Fi Protected Access (WPA) authentication with a server. If you enable WPA, WPA2, or WPA authentication, you must also configure the authentication server. • After selecting an authentication method, enter authentication server information with the following: • Rekey Interval: Sets the group key update interval, which can range from 30-4294967295 seconds. The default value is 1800 seconds. You can also specify 0 to disable key updates. • Encryption Type: Specify the encryption method between the AP and the client: • • • Auto TKIP AES • The Mixed WPA/WPA2 method usually tries with WPA2 if is not successful it falls back to WPA. The standard for WPA2 is 802.11i (WPA has no standardization)
  • 9. Cable Modems with Wi-Fi • Cisco DPC2525 • Ubee • Thomson DWG855 • Cisco DPC2420
  • 10. Cisco DPC2525 • Wireless • 802.11g con 4 SSIDs • Wireless Multimedia (WIMM) including Wi-Fi Protected Setup by button • Dual Antenna • Ethernet • 4 ports • Firewall • Parental Control • Voice • Upgradeable to SIP • Codecs G.711, T.38, G.729, BV16 • Codec Encryption AES-128 • Call Features Support (Caller ID, Call Waiting, Call Forwarding, Call Transfer) • 2 Voice Ports
  • 11. Ubee • Wireless • SSID • Security • WPA2-PSK con AES recommended • Wi-Fi Protected Setup (push button or PIN method) • 802.11 Frequency 802.11b/g/n 2.4 GHz some support 5 GHz. Can select the channels or just use AUTO • RSSI Receive Signal Strength Indicator: Indicates the signal level for each connected device • Firewall • DMZ • Port Scan Detection • Filter Cookies • IP Flood attack • Content Filter • DHCP • Port Forwarding
  • 12. Thomson DWG855 • Voice • 2 RJ11 • RAS & 56 bit encryption security • V.90 fax • Wireless • SSID • Name – Open - Close • • • • • Channel (11 channels - the TWG850 13 channels Enable / Disable Security (WPA/WPA2/WEP/802.1x Radius) Access Control (MAC allow/restric) Advanced (Proprietary Air Interface, Rate, Output Power, Beacon interval) • Bridging WDS (Wireless Distribution System) allows to interconnect APs options: Enable/Disable/Remote Bridges MAC(up to 4)
  • 13. Cisco DPC2420 • Voice • 2 Ports • Ethernet • 1 Port • Wireless • Basic (up to 11 channels– SSID) • Security (WEP/WPA/WPA2 - WPS) • Advanced (data rates and thresholds) • Access Control (filter by MAC, SSID broadcast, Open system o PSK) • WDS Wireless Distribution System • Parental Control • User Setup (create users profile and apply access rules to those users) • Basic Rules (create rules and block content information) • Time of the Day Rules (block all traffic in certain time) • Local Log • Firewall • Web Pages filtering • Event Logging & email config for Alerts • Basic Setting (Network config, time NTP, Mngmt IP, Network) • Advanced Settings • IP Address Filtering • MAC Address Filtering • Port Filtering • Port Forwarding • DDNS (Dynamic DNS – Requires previous subscription to a provider of DDNS – user password host) • Port Triggers (deactivate port when no activity) • DMZ Host (Set IP visibity from outside by passing the firewall) • VPN Termination (configuration and protocol control and VPN tunnels)