CCNA2 - Module 12 & 13 Flashcards

(70 cards)

1
Q
  • is a type of wireless network that is commonly used in homes, offices, and campus environments.
  • WLANs make mobility possible within the home and business environments.
  • Wireless infrastructures adapt to rapidly changing needs and technologies.
A

Wireless LAN (WLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Wireless Networks

A
  • Wireless Personal-Area Network (WPAN)
  • Wireless LAN (WLAN)
  • Wireless MAN (WMAN)
  • Wireless WAN (WWAN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Low power and short-range (20-30ft or 6-9 meters). Based on IEEE 802.15 standard and 2.4 GHz frequency. Bluetooth and Zigbee are WPAN examples.
A

Wireless Personal-Area Network (WPAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Medium sized networks up to about 300 feet. Based on IEEE 802.11 standard and 2.4 or 5.0 GHz frequency.
A

Wireless LAN (WLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Large geographic area such as city or district. Uses specific licensed frequencies.
A

Wireless MAN (WMAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Extensive geographic area for national or global communication. Uses specific licensed frequencies.
A

Wireless WAN (WWAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IEEE WPAN standard used for device pairing at up to 300ft (100m) distance.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • – Supports mesh topology to large scale network devices.
A

Bluetooth Low Energy (BLE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • – Supports point-to-point topologies and is optimized for audio streaming.
A

Bluetooth Basic Rate/Enhanced Rate (BR/EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Alternative broadband wired internet connections. IEEE 802.16 WLAN standard for up 30 miles (50 km).

A

WiMAX (Worldwide Interoperability for Microwave Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Carry both voice and data. Used by phones, automobiles, tablets, and laptops.

A

Cellular Broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • – Internationally recognized
A

Global System of Mobile (GSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • – Primarily used on the US.
A

Code Division Multiple Access (CDMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Uses directional satellite dish aligned with satellite in geostationary orbit. Needs clear line of site. Typically used in rural locations where cable and DSL are unavailable.
802.11 Standards

A

Satellite Broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • – Regulates the allocation of radio spectrum and satellite orbits.
A

International Telecommunication Union (ITU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Specifies how a radio frequency is modulated to carry information. Maintains the standards for local and metropolitan area networks (MAN) with the IEEE 802 LAN/MAN family of standards.
A

Institute of Electrical and Electronics Engineers (IEEE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • Promotes the growth and acceptance of WLANs. It is an association of vendors whose objective is to improve the interoperability of products that are based on the 802.11 standard
A

Wi-Fi Alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Wireless Home Router

A
  • Access point – To provide wires access
  • Switch – To interconnect wired devices
  • Router - To provide a default gateway to other networks and the Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Access Point (AP) Categories

A
  • Autonomous APs – Standalone devices configured through a command line interface or GUI. Each autonomous AP acts independently of the others and is configured and managed manually by an administrator.
  • Controller-based APs– Also known as lightweight APs (LAPs). Use Lightweight Access Point Protocol (LWAPP) to communicate with a LWAN controller (WLC). Each LAP is automatically configured and managed by the WLC.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • – Standalone devices configured through a command line interface or GUI. Each acts independently of the others and is configured and managed manually by an administrator.
A

Autonomous APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • – Also known as lightweight APs (LAPs). Use Lightweight Access Point Protocol (LWAPP) to communicate with a LWAN controller (WLC). Each LAP is automatically configured and managed by the WLC.
A

Controller-based APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Wireless Antennas

A
  • Omnidirectional – Provide 360-degree coverage. Ideal in houses and office areas.
  • DirectionalFocus the radio signal in a specific direction. Examples are the Yagi and parabolic dish.
  • Multiple Input Multiple Output (MIMO)Uses multiple antennas (Up to eight) to increase bandwidth.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

802.11 Wireless Topology Modes

A
  • Ad hoc mode- Used to connect clients in peer-to-peer manner *without* an AP.
  • Infrastructure mode - Used to connect clients to the network using an AP.
  • Tethering - Variation of the ad hoc topology is when a smart phone or tablet with cellular data access is enabled to create a personal hotspot.
    *
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • Uses single AP to interconnect all associated wireless clients.
  • Clients in different BSSs cannot communicate.
A

Basic Service Set (BSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
* A u`nion of two or more BSSs interconnected` by a wired distribution system. * Clients in each BSS can communication through the ESS.
**Extended Service Set (ESS)**
26
are `half-duplex and a client cannot “hear” while it is sending,` making it impossible to detect a collision.
**WLANs**
27
**To achieve successful association, a wireless client and an AP must agree on specific parameters:**
* **SSID** – The `client needs to know the name of the network to connect`. * **Password** – This is r`equired for the client to authenticate to the AP`. * **Network** **mode** – The `802.11 standard in use.` * **Security** **mode** – The `security parameter setting`s, i.e. WEP, WPA, or WPA2. * **Channel** **settings** – The `frequency bands in use.`
28
* – `AP openly advertises its service by periodically sending broadcast beacon frames` containing the SSID, supported standards, and security settings.
**Passive mode**
29
* – `Wireless clients must know the name of the SSID`. The wireless client `initiates the process` by broadcasting a probe request frame on multiple channels.
**Active mode**
30
* is an I`EEE standard protocol that enables a WLC to manage multiple APs and WLANs.` * `Based on LWAPP but adds additional security` with Datagram Transport Layer Security (DLTS). * `Encapsulates and forwards WLAN client traffic` between an AP and a Wireless Lan Controller (WLC) over tunnels using UDP ports 5246 and 5247. * `Operates over both IPv4 and IPv6.` IPv4 uses IP protocol 17 and IPv6 uses IP protocol 136.
**Control and Provisioning of Wireless Access Points (CAPWAP)**
31
* `provides security between the AP and the WLC.` * It is `enabled by default to secure the CAPWAP `control channel and encrypt all management and control traffic between AP and WLC. * `Data encryption is disabled by default` and requires a DTLS license to be installed on the WLC before it can be enabled on the AP.
**Datagram Transport Layer Security (DTLS)**
32
enables the configuration and control of Aps over a WAN link.
**FlexConnect**
33
**2 modes of FlexConnect AP**
* **Connected mode** – The *WLC is reachable*. The FlexConnect AP **has** `CAPWAP connectivity with the WLC through the CAPWAP tunnel.` The WLC performs all CAPWAP functions. * **Standalone mode** – The *WLC is unreachable*. The FlexConnect AP has lost CAPWAP connectivity with the WLC. The FlexConnect AP can assume some of the WLC functions such as `switching client data traffic locally and performing client authentication locally.`
34
* - A m`odulation technique designed to spread a signal over a larger frequency band`. Used by `802.11b` devices to avoid interference from other devices using the same 2.4 GHz frequency.
**Direct-Sequence Spread Spectrum (DSSS)**
35
* - `Transmits radio signals by rapidly switching a carrier signal among many frequency channels`. Sender and receiver must be synchronized to “know” which channel to jump to. Used by the original 802.11 standard.
**Frequency-Hopping Spread Spectrum (FHSS)**
36
* - A s`ubset of frequency division multiplexing in which a single channel uses multiple sub-channels on adjacent frequencies`. OFDM is used by a number of communication systems including 802.11a/g/n/ac.
**Orthogonal Frequency-Division Multiplexing (OFDM)**
37
_______________ can be the result of the following: * Improperly configured devices * A malicious user intentionally interfering with the wireless communication * Accidental interference
**Wireless DoS attacks**
38
* is an `AP or wireless router that has been connected to a corporate network without explicit authorization and against corporate policy.` * Once connected, the rogue AP `can be used by an attacker to capture MAC addresses`, capture data packets, gain access to network resources, or launch a man-in-the-middle attack. * A `personal network hotspot` could also be used as a rogue AP. For example, a user with secure network access enables their authorized Windows host to become a Wi-Fi AP. * To prevent the installation of rogue APs, `organizations must configure WLCs with rogue AP policies and use monitoring software` to actively monitor the radio spectrum for unauthorized APs.
**rogue AP**
39
, the `hacker is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.` A popular wireless MITM attack is called the “**evil twin AP**” attack, where an `attacker introduces a rogue AP and configures it with the same SSID as a legitimate AP.`
**man-in-the-middle (MITM) attack**
40
* `APs and some wireless routers allow the SSID beacon frame to be disabled.` Wireless clients must be manually configured with the SSID to connect to the network.
**SSID Cloaking**
41
* An `administrator can manually permit or deny clients wireless access based on their physical MAC hardware address`. In the figure, the router is configured to permit two MAC addresses. Devices with different MAC addresses will not be able to join the 2.4GHz WLAN.
**MAC Address Filtering**
42
* `No password required`. Typically used to provide `free internet access in public areas `like cafes, airports, and hotels. * Client is responsible for providing security such as through a VPN.
**Open system authentication**
43
* `Provides mechanisms`, such as WEP, WPA, WPA2, and WPA3 to authenticate and encrypt data between a wireless client and AP. However, the `password must be pre-shared between both parties to connect.`
**Shared key authentication**
44
**Shared Key Authentication Methods**
**Wired Equivalent Privacy (WEP)** - Original 802.11 specification - Uses Rivest Cipher 4 (RC4) encryption with a static key - No longer recommended; should never be used **Wi-Fi Protected Access (WPA)** - Wi-Fi Alliance standard - Secures data with the stronger Temporal Key Integrity Protocol (TKIP) - Changes encryption keys for each packet, increasing security **WPA2** - Uses the Advanced Encryption Standard (AES) for encryption - Currently considered the strongest encryption protocol **WPA3** - Next-generation Wi-Fi security - Implements the latest security methods - Disallows outdated legacy protocols - Requires Protected Management Frames (PMF)
45
- Original 802.11 specification - Uses Rivest Cipher 4 (RC4) encryption with a static key - No longer recommended; should never be used
**Wired Equivalent Privacy (WEP)**
46
- Wi-Fi Alliance standard - Secures data with the stronger Temporal Key Integrity Protocol (TKIP) - Changes encryption keys for each packet, increasing security
**Wi-Fi Protected Access (WPA)**
47
- Uses the Advanced Encryption Standard (AES) for encryption - Currently considered the strongest encryption protocol
**WPA2**
48
- Next-generation Wi-Fi security - Implements the latest security methods - Disallows outdated legacy protocols - Requires Protected Management Frames (PMF)
**WPA3**
49
* – Intended for `home or small office networks`, users `authenticate using a pre-shared key (PSK)`. Wireless clients authenticate with the wireless router using a pre-shared password. `No special authentication server is required.`
**Personal**
50
* – Intended for `enterprise networks`. Requires a `Remote Authentication Dial-In User Service (RADIUS) authentication server`. The device must be authenticated by the RADIUS server and then users must authenticate using `802.1X standard, which uses the Extensible Authentication Protocol (EAP) for authentication.`
**Enterprise**
51
* – `Used by WPA and provides support for legacy WLAN equipment`. Makes use of WEP but encrypts the Layer 2 payload using it.
**Temporal Key Integrity Protocol (TKIP)**
52
* – U`sed by WPA2 and uses the Counter Cipher Mode with Block Chaining Message Authentication Code Protocol (CCMP)` that allows destination hosts to recognize if the encrypted and non-encrypted bits have been altered.
**Advanced Encryption Standard (AES)**
53
**Authentication in the Enterprise**
* **RADIUS server IP address** – IP address of the server. * **UDP port numbers** –UDP ports 1812 for RADIUS Authentication, and 1813 for RADIUS Accounting, but can also operate using UDP ports 1645 and 1646. * **Shared key** – Used to authenticate the AP with the RADIUS server.
54
* : Thwarts brute force attacks by using Simultaneous Authentication of Equals (SAE).
**WPA3 – Personal**
55
* : `Uses 802.1X/EAP authentication.` However, it requires the use of a `192-bit cryptographic suite` and eliminates the mixing of security protocols for previous 802.11 standards.
**WPA3 – Enterprise**
56
* : Does not use any authentication. However, uses Opportunistic Wireless Encryption (OWE) to encrypt all wireless traffic.
**Open Networks**
57
* : Uses Device Provisioning Protocol (DPP) to quickly onboard IoT devices.
**IoT Onboarding**
58
**The Wireless Router**
People who work from home, have small offices, or need Wi-Fi at home often use a small router. * These routers usually have a few ports for wired devices, a port for connecting to the internet (often labeled “WAN”), and built-in Wi-Fi. * They offer features like Wi-Fi security, automatic IP address assignment (DHCP), sharing one internet connection with many devices (NAT), and quality of service (QoS) to manage traffic. * The features can be different depending on the router brand and model. Note: Setting up a cable or DSL modem is usually done by a technician from your internet service provider, either in person or remotely.
59
**How to Log In to a Wireless Router**
Most routers are set up to connect to the network right away and start working. * They come with default settings like IP addresses, usernames, and passwords that are easy to find online. * Important: Change these defaults right away to keep your network secure.
60
**Steps to Access the Router Settings**
1. Open a web browser on a device connected to the router. 2. Type in the router’s default IP address (you can find this in the manual or online). 3. Use the default login info (often admin for both the username and password).
61
**Basic Network Setup**
Basic network setup includes the following steps: * Log in to the router from a web browser. * Change the default administrative password. * Log in with the new administrative password. * Change the default DHCP IPv4 addresses. * Renew the IP address. * Log in to the router with the new IP address.
62
**Basic Wireless Setup**
Basic Wireless Setup Basic wireless setup includes the following steps: * View the WLAN defaults. * Change the network mode, identifying which 802.11 standard is to be implemented. * Configure the SSID. * Configure the channel, ensuring there are no overlapping channels in use. * Configure the security mode, selecting from Open, WPA, WPA2 Personal, WPA2 Enterprise, etc.. * Configure the passphrase, as required for the selected security mode.
63
**Configure a Wireless Mesh Network**
In a small office or home network, one wireless router may suffice to provide wireless access to all the clients. * If you want to extend the range beyond approximately 45 meters indoors and 90 meters outdoors, you create a wireless mesh. * Create the mesh by adding access points with the same settings, except using different channels to prevent interference. * Extending a WLAN in a small office or home has become increasingly easier. * Manufacturers have made creating a wireless mesh network (WMN) simple through smartphone apps.
64
**NAT for IPv4**
Typically, the wireless router is assigned a publicly routable address by the ISP and uses a private network address for addressing on the LAN. * To allow hosts on the LAN to communicate with the outside world, the router will use a process called Network Address Translation (NAT). * NAT translates a private (local) source IPv4 address to a public (global) address (the process is reversed for incoming packets). * NAT makes sharing one public IPv4 address possible by tracking the source port numbers for every session established by a device. * If your ISP has IPv6 enabled, you will see a unique IPv6 address for each device.
65
**Quality of Service**
Many wireless routers have an option for configuring Quality of Service (QoS). * By configuring QoS, you can g`uarantee that certain traffic types, such as voice and vide`o, are prioritized over traffic that is not as time-sensitive, such as email and web browsing. * On some wireless routers, traffic can also be prioritized on specific ports.
66
* is a rule-based method of directing traffic between devices on separate networks.
**Port forwarding**
67
**Port Forwarding**
Wireless routers typically block TCP and UDP ports to prevent unauthorized access in and out of a LAN. * However, there are situations when specific ports must be opened so that certain programs and applications can communicate with devices on different networks. * Port triggering allows the router to temporarily forward data through inbound ports to a specific device. * You can use port triggering to forward data to a computer only when a designated port range is used to make an outbound request.
68
* is a `controller-based AP as opposed to an autonomous AP`, so it requires no initial configuration and is often called `lightweight APs (LAPs).`
**access point (AP)**
69
use the Lightweight Access Point Protocol (LWAPP) to communicate with a WLAN controller (WLC).
**lightweight APs (LAPs).**
70
* s are useful in situations where many APs are required in the network.
**Controller-based AP**