En FWL ILM v12
En FWL ILM v12
En FWL ILM v12
This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for noncommercial distribution and exclusive use by instructors in the Fundamentals of Wireless LANs course as part of an official Cisco Networking Academy Program.
Cisco Aironet Client Adapters Cisco Aironet 1200 Series Access Point (802.11a and 802.11b)
Objective
The following objectives will be covered in this lab Identify the basic media characteristics of wireless LANs Identify the components of a Wireless LAN Describe the functions of the Wireless components
Scenario
Wireless Local Area Networks (WLANs) have become a popular choice in network installations. Implementing a WLAN is simple because installation is generally limited to installing building mounted antennas and placing the access points (AP). Local Area Networks (LANs) will quickly become a mixture of wired and wireless systems depending on the network needs and design constraints. In larger enterprise networks, the core and distribution layers will continue as wired backbone systems. Enterprise systems are typically connected by fiber optics and unshielded twisted pair (UTP) cabling. Even in many smaller networks, there still remains a wired LAN at some level.
1 - 430
Preparation
The instructor will setup 4 equipment stations: Station 1 Station 2 Station 3 Station 4 Wireless AP(s) Bridge(s) Client Adapter(s) Antenna(s) Wired Hub or Switch Fiber Optic, modem, WAN Switch Wired Ethernet NIC Ethernet Cable
The instructor will allow the students to examine the equipment and be able to compare the equipment to wired networking equipment. The following tools and resources will be required to complete the lab: A conventional PCI and PCMCIA Network Interface Card(s) for wired networking connections Physical media such as UTP A conventional wired network hub or switch The Cisco Wireless course equipment bundle
Safety
Do not handle any wireless devices while they are powered. A general rule is to not touch or come within several inches of any powered antenna. Also, make sure to power down any device before removing a PCI or PCMCIA card. Most important, do not remove antennas from a Wireless AP or Bridge while powered. This can damage the unit.
Station 1 AP
The AP station contains at least one model of a wireless AP. Depending on the academy equipment inventory, there may be multiple models and vendors. There will also be some wired equivalent devices. a. What models of Cisco APs are currently listed at cisco.com? Answers will vary. Example: Aironet 1200 b. What is the model of the AP at the station? Answers will vary. Example: AP1200, MFB350 c. What is the frequency range(s) of the AP provided? Answers will vary. Example: 2.412 to 2.462 GHz d. Does the AP have a detachable antenna or is the antenna built in? Answers will vary. Example: Detachable e. What wired ports are available? Answers will vary. Examples: Ethernet, RJ-45 f. What is the wired equivalent to the AP that is located at station 1? Answers will vary. Examples: hub, repeater
2 - 430
g. What are the advantages and disadvantages of the wired and wireless access devices? Device Aironet 1200 Access Point Hub Advantage Allows users to move freely about the office Ease of use Disadvantage Possibility of security issues No segmentation of collision domains
h. Draw and label the appropriate icons for the AP, hub, and switch in the space below.
3 - 430
h. Draw and label the appropriate icons for the bridge, modem, and serial line in the space below.
g. Draw and label the appropriate icons for the client adapter in the space below.
____________________________________________________________________
4 - 430
Station 4 antenna
The antenna station contains at least one antenna model. Depending on the academy equipment inventory, there may be multiple models and vendors. There will also be some wired equivalent devices or media. a. What is the model of the antenna? Answers will vary. Example: AIRANT3195 b. What is the frequency range of the antenna provided? Answers will vary. Example: 2.4 GHz c. What is the wired equivalent to the antenna that is located at station 4? Answers will vary. Example: NIC d. What are the advantages and disadvantages of the antenna devices? Device Wireless LAN Adapter PCI NIC Advantage No wires required Low cost Disadvantage Possible security issues Must have a physical connection to transmit data
e. Draw and label the appropriate icons for the antenna, wireless signal, and Ethernet line in the space below.
_____________________________________________________________________________
5 - 430
Objective
The following objectives will be covered in this lab: Learn the topologies for the basic WLAN design. Learn the topology in the basic metropolitan area design.
Scenario
WLAN technology has two functions. First, WLAN can take the place of a traditional wired network. Second, WLAN can extend the reach and capabilities of a traditional wired network. Much like wired LANs, in-building WLAN equipment consists of a Personal Computer Memory Card International Association (PCMCIA) card, a personal computer interface (PCI) or industry-standard architecture (ISA) client adapters, and wireless APs. WLANS are also similar to wired LANs for small or temporary installations. A WLAN can be arranged in a peer-to-peer or ad hoc topology using only client adapters. For added functionality and range, APs can be incorporated to act as the center of a star topology or function as a bridge to an Ethernet network. With a wireless bridge, networks located in buildings miles away from each other can be integrated into a single local-area network.
6 - 430
Topology
Preparation
The instructor will need at least one laptop computer, at least one desktop computer, and the equipment in the wireless course equipment bundle. The instructor should attempt to have as many wireless computers as possible, in order to display the concepts involved in the wireless network. The following tools and resources will be needed for this lab: Wireless networking course equipment bundle Laptop computers with the PCMCIA NIC inserted Desktop computers with the PCI NIC inserted A switch or hub for a wired connection A computer to act as a server on the wired network
The instructor may compile any variety of equipment on the wired network to depict the wired network in a more realistic setting.
7 - 430
8 - 430
Objective
The student will learn the future direction and technologies associated to wireless regulations.
Scenario
There is continual development in wireless LAN (WLAN) technologies. One primary challenge is to conform to local, state, and national regulations related to wireless LAN emissions. Our focus is on Wireless emissions that occur in the 2.4 GHz and 5 GHz radio frequency spectrums. In this lab, each team will be assigned a topic to investigate.
Preparation
The instructor should compile a list of wireless regulatory bodies. This lab will require a computer with a connection to the Internet for online research purposes. The student teams should be encouraged to research resources such as trade publications, magazines, and vendor literature that are applicable to current and future trends in the area of wireless local area networks.
9 - 430
Step 3 Presentations
a. Give a brief summary of the regulatory agencies researched. Answers will vary. Example: The FCC is an independent US government agency that regulates communication by radio, television, wire, satellite and cable. b. What is the future trend of wireless this agencys regulations in the 2.4 GHz RF spectrums? Answers will vary. c. What is the future trend of wireless this agencys regulations in the 5 GHz RF spectrums? Answers will vary. d. How does this body differ from the others? Answers will vary. e. What officials comprise the regulatory agency or body? Answers will vary. f. How do companies comply with the regulations? Answers will vary. g. How do the regulatory agencies police the airwaves? Answers will vary. h. What action(s) do they take for violations? Answers will vary. i. What penalties are imposed for violations? Answers will vary.
10 - 430
Objective
The student will research a topic involved with the future direction and technologies associated with wireless networking.
Scenario
There is continual development in the WLAN community. One emerging standard is 802.11g. 802.11g operates at higher speeds than 802.11b in the 2.4-GHz range. 802.11g, like 802.11a, supports Orthogonal Frequency Division Multiplexing (OFDM) modulation with speeds up to 54 Mbps. 802.11g is designed to be backwards compatible with 802.11b clients. If additional speed is needed, 802.11g may become a good choice. If the 2.4-GHz frequency is noisy at a given locale, 802.11a 5-GHz technology may be a better option.
Preparation
The instructor should compile a list of current trends in the area of Wireless Local Area Networking or use the topics given in step 1 of the lab. This lab will require a computer with a connection to the Internet for online research purposes. Utilize resources such as trade publications, magazines, and vendor literature that are applicable to current and future trends in the area of wireless local area networks.
Step 1 Assign each group a specific topic from the list below to research
WLAN security WLAN frequency ranges WLAN devices WLAN connection speeds WLAN applications WLAN vendors Team Team 1 Team 2 Team 3 Team 4 Team 5 Team 6 Topic Assigned:
11 - 430
Step 3 Presentations
a. Give a brief summary of the Wireless Local Area Networking topic researched. Answers will vary. Example: The FCC is the regulatory agency that oversees the use of the wireless spectrum in the US. This regulation includes decisions regarding frequency ranges and their use. b. What is the future trend of this topic for Wireless Local Area Networking? Answers will vary. c. What companies are involved in the development of the wireless networking topic? Answers will vary. d. Is there an IEEE standard for the topic researched? If so, what is it? Answers will vary.
12 - 430
Objective
The student will learn the procedures for installing the client adapter in the PC for wireless networking.
Scenario
Install a wireless LAN adapter (WLAN) card in a laptop, desktop, or both.
13 - 430
Preparation
This lab will require the following materials: Desktop or Laptop PC One Cisco Aironet PCI352, CB20A, or PCM 352 Client Adapter Network Interface Card. One PC installed with a Microsoft Operating System One Screwdriver for PCI card installation Instructor should preconfigure SSIDs on the APs and determine the IP addresses needed for the PCs or laptop computers that are used in this lab
Insert the Cisco Aironet PCM 352 Client Adapter into the PCMCIA slot. The CB20A installs into the Laptop PC cardbus slot. A CardBus adapter will not fit completely into a PCMCIA laptop slot. This may be a problem on older laptops. A PCMCIA adapter, however, will fit in a PCMCIA slot or a CardBus slot. Below is a comparison of the cards.
Notice the different shape on the right hand side of the cards. a. Which card is located in the top of the graphic? PCMCIA, PCM352, 802.11b card b. Which card is located on bottom? CardBus, CB20A, 802.11a card
14 - 430
d. Examine the client adapter. The antenna connector and the LEDs face out of the computer and are visible when the cover is placed back on. Prior to installing the card, check to make sure the 2-dB dipole 'rubber ducky" antenna has been removed to prevent damage during the card insertion. e. Tilt the adapter to allow the antenna connector and LEDs to slip through the opening in the CPU back panel. f. Press the client adapter into the empty slot until the connector is firmly seated. Install the screw.
15 - 430
g. Reinstall the screw on the CPU back panel and replace the computer cover. h. Attach the 2-dB dipole antenna to the adapter antenna connector until it is finger-tight.
i. j.
For optimal reception, position the antenna so it is straight up. Boot up the computer and proceed to Step 3. Install the drivers for Windows.
16 - 430
e. Right-click the Cisco Systems 350 Series PCMCIA Wireless LAN adapter, or the applicable Aironet Card. f. Click Properties. g. In the client adapter Properties window, click the Advanced tab. h. In the Advanced window, select Client Name. Type the unique client name of the computer in the Value dialog box. i. Select SSID. Type the RF network SSID, as assigned by the instructor, in the Value dialog box. Remember the SSID is case-sensitive. Click OK.
The Service Set Identifier (SSID) is a unique identifier that stations must use to be able to communicate with an AP. The SSID can be any alphanumeric entry up to a maximum of 32 characters.
Note
17 - 430
Objective
The student will learn the procedures for installing the Aironet Client Utility (ACU). Also, the student will configure, select, and manage profiles.
Scenario
Install and configure the ACU to allow a user to configure, manage, and monitor wireless connections.
Topology
Preparation
This lab will require the following materials: Desktop or Laptop PC Appropriate wireless client adapter card One Cisco Aironet PCI352, CB20A, or PCM 352 Client Adapter Network Interface Card. Aironet Client Utility installer 2 configured APs (instructor must setup) o o Office Profile Home Profile AP1 SSID of AP1 AP2 SSID of AP2
Resources
http://www.cisco.com/en/US/products/hw/wireless/ps4555/products_installation_and_configuration_g uide_book09186a0080184b6e.html
18 - 430
After the appropriate driver is installed for the computer's operating system and for the client adapter type, follow the steps below to install the Aironet Client Utility (ACU). If EAP-TLS, EAP-MD5, PEAP, or EAP-SIM authentication is going to be used on a computer running Windows 2000, Service Pack 3 for Windows 2000 and the Windows 2000 Wireless 802.1X hot fix must be installed before installing ACU. Follow the procedure below if ACU has never been installed on the computer or if ACU version 4.13 or greater is currently installed. If a version of ACU prior to 4.13 is installed on the computer, uninstall it; then follow the steps below to install the latest version. Cisco does not recommend uninstalling ACU version 4.13 or greater before installing the latest version of ACU. ACU version 5.05.001 or greater must be used with one of the following software combinations:
19 - 430
PCM/LMC/PCI card driver version 8.2 or greater and firmware version 4.25.30 or greater Mini PCI card driver version 3.4 or greater and firmware version 5.00.03 or greater
Copyright 2003, Cisco Systems, Inc.
Note
PC-Cardbus card driver version 3.4 or greater and firmware version 4.99 or greater
The most recent version of the ACU can be obtained through the Software Center on the Cisco Connection Online (CCO)
a. To install or use the client utilities on Windows NT or Windows 2000 systems, a user must log onto the system as a user with administrative privileges. The utilities do not install or operate correctly for users not logged in with administrative rights. b. Select Start then Run and enter the path for the downloaded ACU setup.exe file. To use the CD go to d:\Utilities\ACU\setup.exe. d is the letter of the CD-ROM drive. c. Execute the ACU setup.exe file. When the Welcome screen appears, click Next. d. In the Authentication Method screen, select None, the default value, for server-based authentication is not enabled for a client adapter and click Next.
Note See the hyperlink in the Resources section to find out more about the Authentication choices.
e. After the client utilities are installed, a user can elect not to implement any security features, or a user can activate some level of security by using WEP keys. f. In the Select Components screen, make sure the client utilities are selected. Make sure that any undesired utilities are deselected. Click Next.
g. In the Select Program Folder screen, click Next to allow icons for the client utilities to be placed in the Cisco Systems, Inc. folder. h. If no server-based authentication was selected in Step 3, select Launch the Aironet Client Utility and click Finish. The ACU opens so that the client adapter can be configured.
20 - 430
a. Double-click the Aironet Client Utility (ACU) icon on your desktop to open the ACU's profile manager. b. Click the Profile Manager icon or select Profile Manager from the Commands drop-down menu. The Profile Manager screen appears. What tasks does the Profile manager allow? Create a new profile Select the active profile Edit a profile Set a profile to default values
21 - 430
Follow the steps below to create a new profile. a. Click Add. A cursor appears in the Profile Management edit box. b. Enter the name for the first new profiles named Office c. Press Enter. The Properties screens appear with the name of the new profile in parentheses.
To use the default values, click OK. The profile is added to the list of profiles on the Profile Manager screen.
Note
d. Configure the Client name and SSID for the Office profile as directed by the instructor in order to connect to the AP. e. Click OK or Apply to save your profile. f. Create profiles named Home and Airport
22 - 430
Follow the steps below to specify the profile that the client adapter is to use. a. Open ACU; click the Select Profile icon or select Select Profile from the Commands drop-down menu. The Select Profile screen appears. b. Select Use Selected Profile c. Now select the Office Profile.
d. Click OK or Apply to save the selection. The client adapter starts using a profile based on the option selected above.
Note If the client adapter cannot associate to an AP or loses association while using the selected profile, the adapter does not attempt to associate using another profile. To associate, a different profile must be selected or select Use Auto Profile Selection. Use Auto Profile SelectionThis option causes the client adapter's driver to automatically select a profile from the list of profiles that were set up to be included in auto profile selection. Use Another Application To Configure My Wireless Settings This option allows an application other than ACU to configure the client adapter. Examples of such applications include Windows XP and Boingo. You must select this option if you are configuring your card through Windows XP or 2000 but want to use ACU's diagnostic tools.
23 - 430
The profile can also be quickly switched through the system tray using ACM.
a. Left click on the ACU icon and go to Select Profile, then choose the Home profile. b. The client will now associate to the second AP. Observe the ACM icon. c. Now select the Airport profile. Observe the ACM icon turn gray d. Finally, re-select the Office profile to connect to the first AP. The ACM icon should turn green.
24 - 430
The appearance of the ACM icon indicates the connection status of your client adapter. ACM reads the client adapter status and updates the icon every 2 seconds
Icon
The client adapter is associated to an AP, but the user is not authenticated.
The client adapter is associated to an AP, and the link quality is excellent or good.
The client adapter is associated to an AP, and the link quality is fair.
The client adapter is associated to an AP, and the link quality is poor.
e. What is the status of the client adapter? Answer will vary. Example: The client adapter is associated to an AP, and the link quality is excellent or good.
Editing a Profile
a. Open ACU; click the Profile Manager icon or select Profile Manager from the Commands dropdown menu. The Profile Manager screen appears. b. From the Profile Management drop-down box, select the profile that you want to edit. c. Click Edit. The Properties screens appear with the name of the profile in parentheses. d. Change any of the configuration parameters for this profile. e. Click OK or Apply to save your configuration changes.
25 - 430
b. From the Profile Management drop-down box, select the profile that you want to set to default values. c. Click Use Defaults. d. When prompted, click Yes to confirm your decision. e. Click OK or Apply to save your change. The profile is saved with default values.
Renaming a Profile
a. Open ACU; click the Profile Manager icon or select Profile Manager from the Commands dropdown menu. The Profile Manager screen appears. b. From the Profile Management drop-down box, select the profile that you want to rename. c. Click Rename. The Profile Management edit box becomes enabled. d. Enter a new name for the profile. e. Click OK or Apply to save your change. The profile is renamed and added to the list of profiles.
Deleting a Profile
a. Open ACU; click the Profile Manager icon or select Profile Manager from the Commands dropdown menu. The Profile Manager screen appears. b. From the Profile Management drop-down box, select the profile that you want to delete. c. Click Delete. d. When prompted, click Yes to confirm your decision. e. Click OK or Apply to save your change. The profile is deleted.
Follow the steps in the corresponding section below to import or export profiles.
Exporting a Profile
a. Insert a blank floppy disk into your computer's floppy drive, if you wish to export a profile to a floppy disk. Or save the file to the PC hard disk. b. Open ACU; click the Profile Manager icon or select Profile Manager from the Commands drop-down menu. The Profile Manager screen appears c. From the Profile Management drop-down box, select the profile that you want to export. d. Click Export. The Save Profile As screen appears. The default filename is ProfileName.pro, where ProfileName is the name of the selected profile, and the default directory is the directory in which ACU was installed. e. If you want to change the profile name, enter a new name in the File name edit box. f. Select a different directory (for example, your computer's floppy disk drive or a location on the network) from the Save in drop-down box.
26 - 430
Importing a Profile
a. If the profile that you want to import is on a floppy disk, insert the disk into your computer's floppy drive. b. Open ACU; click the Profile Manager icon or select Profile Manager from the Commands dropdown menu. The Profile Manager screen appears. c. Click Import. The Import Profile screen appears. d. Find the directory where the profile is located. e. Click the profile so it appears in the File name box at the bottom of the Import Profile screen. f. Click Open. The imported profile appears in the list of profiles on the Profile Manager screen.
a. Open ACU by double-clicking the Aironet Client Utility (ACU) icon on your desktop. b. Click the Preferences icon or select Preferences from the Options drop-down menu. The Aironet Client Utility Preferences screen appears. c. Deselect the Allow Non-Administrator Users to save profiles to the registry check box (or select this check box if you wish to allow regular-class users to save profiles).
a. Uninstall the Client Utilities b. Close any Windows programs that are running. c. Insert the Cisco Aironet Series Wireless LAN Adapters CD into the computer CD-ROM drive. d. Select Start then Run and enter the following path: d:\Utilities\ACU\setup.exe. d is the letter of the CD-ROM drive. e. When the Welcome screen appears, select Remove and click Next. f. When asked if selected applications should be completely removed, click Yes. g. If a message appears indicating that a file was detected that may no longer be needed by any application but deleting the file may prevent other applications from running, click Yes. h. If a message is received indicating that locked files were detected, click Reboot. i. j. In the Maintenance Complete screen, click Finish. If prompted to restart the computer, remove the CD from the computer CD-ROM drive and click Yes.
28 - 430
Objective
The student will learn the procedures for installing the Aironet Desktop Utility (ADU). Also, the student will configure, select, and manage profiles.
Scenario
Install and configure the ADU to allow a user to configure, manage, and monitor wireless connections when using Cisco Aironet IEEE 802.11a/b/g Wireless Adapters. The Cisco Aironet IEEE 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) are radio modules that provide transparent wireless data communications between fixed, portable, or mobile devices and other wireless devices or a wired network infrastructure. The client adapters are fully compatible when used in devices supporting "plug-and-play" (PnP) technology. The AIR-CB21AG PC-Cardbus card is an IEEE 802.11a/b/g-compliant 2.4- and 5-GHz 54-Mbps client adapter card radio module with a Cardbus interface that can be inserted into any device equipped with an external 32-bit Cardbus slot. Host devices can include laptops and notebook computers.
29 - 430
The AIR-PI21AG PCI card is an IEEE 802.11a/b/g-compliant 2.4- and 5-GHz 54-Mbps client adapter card radio module that can be inserted into any device equipped with an empty PCI expansion slot, such as a desktop personal computer.
Two client utilities are available for use with the client adapters: Aironet Desktop Utility (ADU) and Aironet System Tray Utility (ASTU). These utilities are optional applications that interact with the client adapter's radio to adjust settings and display information. ADU enables you to create configuration profiles for your client adapter and perform user-level diagnostics. Because ADU performs a variety of functions, it is documented by function throughout this manual. ASTU, which is accessible from an icon in the Windows system tray, provides a small subset of the features available through ADU. Specifically, it enables you to view status information about your client adapter and perform basic tasks.
30 - 430
Topology
Preparation
This lab will require the following materials: Desktop or Laptop PC Appropriate wireless client adapter card One Cisco Aironet CB21AG or PI21AG Client Adapter Network Interface Card. Aironet Desktop Utility installer 2 configured APs (instructor must setup) o o Office Profile Home Profile AP1 SSID of AP1 AP2 SSID of AP2
31 - 430
Prior to installing ADU software and card drivers, the client adapter should be installed into the laptop or desktop computer. When the computer reboots, Windows may recognize that hardware has been installed. a. Click Cancel on the Windows Found New Hardware Wizard to continue.
32 - 430
b. Navigate to the installation file for the client adapter. This file can be found either on the CD that came in the package with the CD or on the local PC if this file was downloaded from Cisco.com. Double click the file to begin installation.
c.
The Installation Program will open and prompt for any necessary input. Click Next to continue.
33 - 430
d. From the available Setup types, select the first option: Install Client Utilities and Driver. This option will install all of the necessary files for both the client adapter and the desktop utility. Click Next to continue.
e. Now there is a prompt to accept a system reboot after installation completes. Click Yes to continue installation. Clicking No will cause installation to abort.
f.
The default settings can be accepted for the destination folder. Remember to reboot the computer when installation has completed.
34 - 430
d. Click Use the following IP address and enter the IP address, subnet mask, and default gateway address obtained from the instructor. Click OK. e. In the Local Area Connection Properties window, click OK. f. If prompted to restart the computer, click Yes. g. The driver installation is complete.
The tabbed interface of the ADU allows access to each of the necessary tasks to configure and monitor the client adapter.
35 - 430
a. Click the Advanced tab to view detailed setting information for the card. The Advanced Status tab can provide useful information about the current SSID as well as association information for the card. Click OK to close the window and return.
36 - 430
b. View the General, Security and Advanced settings for the profile. Notice that each profile has many configuration options available. Click the Cancel button to return to the Profile Management window.
c.
To create two new profiles named Home and Airport, select the New button. First create the Home profile. Use a Profile Name that makes it easier to remember where this profile is used. The Client Name should be a useful identifier for the computer. In the SSID1 field, type Home. SSIDs are case sensitive and must match the AP or bridge exactly. Click OK to continue.
37 - 430
38 - 430
Configured profiles can be tried in a specified order. This is useful when a laptop is used in multiple areas consistently. For instance, a laptop might be used daily at work and then at home during the evening. Auto selected profiles in this case would be an easy way to ensure that the laptop associated with the access point at each site. b. From the Profile Management window, select the Order Profiles button. c. The configured profiles will appear in the top window as Available Profiles. One or more of these profiles can be added to the Auto Selected Profiles list by selecting the profile and clicking the Add button. Once in the list, the profiles can be ordered by preference. The adapter will try each profile in order until one associates with an access point.
a. Right click on the ADU icon and go to Select Profile, then choose the Home profile. b. The client will now associate to the second AP. Observe the ACM icon. c. Now select the Airport profile. Observe the ACM icon turn gray d. Finally, re-select the Office profile to connect to the first AP. The ACM icon should turn green.
39 - 430
The appearance of the ACM icon indicates the connection status of the client adapter. The ACM reads the client adapter status and updates the icon every 2 seconds Icon Description The client adapter's radio is turned off. The client adapter is not associated to an AP. The client adapter is associated to an AP, but the user is not authenticated. The client adapter is associated to an AP, and the link quality is excellent or good. The client adapter is associated to an AP, and the link quality is fair. The client adapter is associated to an AP, and the link quality is poor.
To back up profiles before uninstalling the client adapter driver or changing radio types To set up a computer with a profile from another computer To export one of the profiles and use it to set up additional computers
Follow the steps in the corresponding section below to import or export profiles.
Exporting a Profile
a. Insert a blank floppy disk into the computer's floppy drive, or save the file to the PC hard disk. b. Open the ADU. From the Profile Management tab, select the profile to export. Click the Export button. c. The Export Profile screen appears. The filename and directory can be changed. d. Click Save to export the profile.
Importing a Profile
a. Open the ADU and click the Profile Management tab. b. Click Import. The Import Profile window appears. Navigate to the directory where the profile is located. Click the profile so it appears in the File name box at the bottom of the Import Profile screen. c. Click Open. The imported profile appears in the list of profiles on the Profile Manager screen.
41 - 430
42 - 430
Objective
The student will learn the procedures for configuring ACU to use Auto Profiles.
Scenario
The Use Auto Profile Selection option causes the driver for the client adapter to automatically select a profile from the list of profiles that were set up to be included in auto profile selection. The name of the profile that is being used appears in the box to the right of the Use Auto Profile Selection option. If the client adapter loses association for more than 10 seconds, the driver switches automatically to another profile that is included in Auto Profile Selection. The adapter will not switch profiles as long as it remains associated or reassociates within 10 seconds (or within the time specified by the LEAP authentication timeout value). To force the client adapter to associate to a different AP, Auto Profile Selection must be disabled and a new profile must be selected.
Topology
43 - 430
Preparation
This lab will require the following materials: 3 Desktop or Laptop PC Appropriate wireless client adapter card One Cisco Aironet PCI352, CB20A, or PCM 352 Client Adapter Network Interface Card. Aironet Client Utility installer Two configured AP (instructor must setup) o o o AP1 SSID of AP1 AP2 SSID of AP2 AP3 SSID of AP3 (optional)
Resources
http://www.cisco.com/en/US/products/hw/wireless/ps4555/products_installation_and_configuration_g uide_chapter09186a008007f869.html#1091568
44 - 430
a. Click the Manage button next to the Use Auto Profile Selection option. The Auto Profile Selection Management screen appears
45 - 430
b.
All the created profiles are listed in the Available Profiles box. Highlight each one to include in auto profile selection and click the Add button. The profiles move to the Auto Selected Profiles box. The first profile in the Auto Selected Profiles box has the highest priority while the last profile has the lowest priority. To change the order and priority of the auto-selectable profiles, highlight the profile to be moved and click the High Priority or Low Priority arrow to move the profile up or down, respectively.
c.
d. Click OK to save the changes. When auto profile selection is enabled, the client adapter scans for an available network. The profile with the highest priority and the same SSID as one of the found networks is the one that is used to connect to the network. If the connection fails, the client adapter tries the next highest priority profile that matches the SSID and so on. To remove a profile from auto profile selection, highlight the profile in the Auto Selected Profiles box and click the Remove button. The profile moves to the Available Profiles box.
d. After connecting to the highest priority AP, turn off the AP. Observe the ACM icon status. e. Since the High Priority AP is down, the Auto Profile will attempt to connect to the AP. After an unsuccessful attempt, the Profile Manager will try to connect using the second highest profile in the list.
46 - 430
Objective
The student will learn the procedures for configuring ADU to use Auto Profiles.
Scenario
The Auto Selected Profiles configuration option causes the client adapter to automatically use a profile from the list when attempting to associate with a network. If the client adapter loses association for more than 10 seconds, the driver switches automatically to another profile that is included in Auto Selected Profiles list. The adapter will not switch profiles as long as it remains associated or reassociates within 10 seconds (or within the time specified by the LEAP authentication timeout value). To force the client adapter to associate to a different AP, the desired profile must be selected from the Profile Management window.
Topology
47 - 430
Preparation
This lab will require the following materials: 3 Desktop or Laptop PC Appropriate wireless client adapter card One Cisco Aironet Client Adapter Network Interface Card. Aironet Desktop Utility Two configured APs (instructor must setup) o o o o AP1 SSID of AP1 AP2 SSID of AP2 AP3 SSID of AP3 (optional) AP4 SSID of AP4 (optional)
48 - 430
When auto profile selection is enabled, the client adapter scans for an available network. The profile with the highest priority and the same SSID as one of the found networks is the one that is used to connect to the network. If the connection fails, the client adapter tries the next highest priority profile that matches the SSID and so on. To remove a profile from auto profile selection, highlight the profile in the Auto Selected Profiles box and click the Remove button. The profile moves to the Available Profiles box.
49 - 430
Objective
Students will use the Aironet Client Utilities (ACU) to complete the following tasks: Assess the performance of the Radio Frequency (RF) link View the status of the wireless network View the statistics of the wireless network View the link status of the wireless network
Topology
50 - 430
Scenario
ACU provides tools that enable a wireless technician to assess the performance of the client adapter and other devices on the wireless network. ACU diagnostic tools perform the following functions: Display the current status and configured settings of the client adapter Display statistics pertaining to the transmission and reception of data of the client adapter Display a graphical image of the client adapter RF link Run an RF link test to assess the performance of the RF link between the client adapter and its associated AP.
Preparation
The instructor will prepare one AP that will be used by the whole class to perform this lab exercise. An IP address and SSID must be configured for the AP.
51 - 430
Select the Link Test button from the Aironet Client Utility screen. The Link Test Screen will appear on the desktop.
52 - 430
In the IP Address of AP field, notice, by default, the IP address is the AP to which the wireless NIC is associated. This IP address could be changed to another wireless device IP address. The link test can be setup to run until it has attempted to send a specific number of packets or to run until it is stopped. Choose one of the following steps to determine how long the link test will run: a. Select the number of packets that the link test should attempt to send. A number can be entered in the Number of Packets field or the slider can be used to select this value. (The Number of Packets parameter is ignored if the Continuous Linktest checkbox is selected.) Range: 1 to 1000 Default: 100 b. Select the Continuous Linktest checkbox to allow the link test to run continuously. Default: Deselected c. Select the size of the data packet that is to be sent. Using the ACU, a number can be entered in the Packet Size field or the slider can be used to select this value. Range: 64 to 2048 Default: 64
53 - 430
Click the Start button to run the link test. While the test is running, statistics are displayed and updated periodically. a. What is the Cumulative Total of the AP Receive Statistics (Packets)? Answers will vary. Example: 14 b. What is the Cumulative Total of the AP Transmit Statistics (Packets)? Answers will vary. Example: 9
54 - 430
From the Aironet Client Utility screen, select the Statistics button.
55 - 430 Fundamentals of Wireless LANs v 1.2 Lab 2.6.5.1 Copyright 2003, Cisco Systems, Inc.
a. Which statistics are incrementing greater, transmit or receive? Why? Wireless networking is a shared media. The receive frames increment even when the transmit frames stay fairly static and no activity is being generated. This traffic is as a result of the other devices including the AP on the wireless network b. Define the following terms from the Statistics screen: RTS Request to Send is a signal sent from the wireless NIC to the AP (or remote wireless device in an ad hoc environment) indicating that it has a frame waiting to transmit. CTS Clear to Send is a signal indicating that it is okay to transmit a frame. ACK Acknowledgement is a signal from a remote device indicating that a frame was successfully received.
a. Bring up the Link Status Meter. Click the Link Status Meter button on the ACU. b. Observe the Signal Quality over a period of 30 seconds. 1. What is the Signal Quality of the AP? Answers will vary. Example: 98% 2. What is the Signal Strength of the AP? Answers will vary. Example: 94%
56 - 430
Objective
Students will use the Aironet Desktop Utility (ADU) to complete the following tasks when using a Cisco Aironet IEEE 802.11a/b/g Wireless Adapter: Assess the performance of the Radio Frequency (RF) link View the general and advanced transmit/receive statistics View the adapter information Run and analyze troubleshooting reports
Topology
57 - 430
Scenario
The ADU provides tools that enable a wireless technician to assess the performance of the client adapter and other devices on the wireless network. ADU diagnostic tools perform the following functions: Display the current status and configured settings of the client adapter Display statistics pertaining to the transmission and reception of data of the client adapter Display a graphical image of the client adapter RF link Run an RF link test to assess the performance of the RF link between the client adapter and its associated AP.
Preparation
The instructor will prepare one AP that will be used by the whole class to perform this lab exercise. An IP address and SSID must be configured for the AP. The instructor must announce or post the AP SSID to which student clients should connect.
Record the following information from the Current Status screen: 1. Profile Name: 2. Network Type: 3. Data Encryption: 4. Adapter IP Address: If the connection is made from a laptop computer, move the computer to another part of the room and observe the Signal Strength. The graphical display should change as the adapter receives a stronger or weaker signal from the access point.
58 - 430
59 - 430
Step 3 Diagnostics
The Diagnostics tab has several useful utilities. Basic transmit and receive statistics are presented on the main page. These statistics are useful to determine if the adapter is sending and receiving wireless data.
60 - 430
Clicking the Advanced Statistics button will open up a window with more detailed information for the wireless connection. Two of the most useful categories of information in this window include authentication statistics and encryption error statistics. When security is applied to the access point, these statistics will be useful to determine if the adapter has had authentication or encryption errors.
The Adapter Information button opens a window that provides information about the adapter hardware. One very useful parameter displayed is the adapter MAC address. 1. Record the adapter MAC address here:
61 - 430
Step 4 Troubleshooting
The Troubleshooting button is used to access the built in diagnostic tests. Click the Start Test button to begin the diagnostic tests.
Once the tests have completed, a detailed report can be viewed. This report provides useful information for troubleshooting both the hardware and software configuration of the wireless adapter.
62 - 430
Scroll through the test results and record the following information: 1. Active Profile Name: 2. AP name: 3. AP IP address: 4. Default network gateway:
63 - 430
Objective
Each team will configure several personal computers to communicate with each other without an AP or cables.
Scenario
Several PCs equipped with Cisco Aironet Client Adapters will be needed. They should be installed and setup. Configure the Aironet Client Utility (ACU) to allow them to connect together as a network without an AP. Perform some of the diagnostics included in the ACU for Ad Hoc mode. Passive mode differs from active mode in Wireless LANs. The diagnostics tests that are performed in Passive mode can help determine the best placement and coverage for the AP of the network. Instead of using an AP, the other PC becomes the wireless client that can provide similar information. Active Mode performs these diagnostics with the use of an AP. This lab is an exercise to familiarize the student with how to gather some of this valuable information.
Topology
Preparation
Prior to this lab, all the PCs should be equipped with working Cisco Aironet Client Adapters. The Aironet Client Utility should be installed on the computers. It is very important for the instructor to assign team numbers. Also, unique IP Addresses should be assigned to each client adapter or personal computer within each team to avoid IP conflicts. Each team should use the same SSID for each PC in the pod to ensure that the computers associate to each other. The SSID to be used for all PCs is adhocP (where P is the group number assigned by the instructor). The instructor should help students understand the addressing scheme. Using the information in the following chart, configure the host computers. Note that no default gateway is needed. By assigning unique IP addresses and SSIDs, the students avoid conflict with other teams.
64 - 430
Team 1
Client2a Client2b
Client3a Client3b
The following tools and resources will be required to complete this lab: Two PCs equipped with the Cisco Aironet Client Adapter per group. One of the computers should be a laptop for mobility purposes.
Step 2 Select the profile named adhocP (where P is the team number)
a. From the Aironet Client Utility, click on Select Profile icon. b. From the Use Selected Profile drop down box, select adhocP. c. Click on the OK button. d. Notice that a message appears on the status line at the bottom the Aironet Client Utility that the wireless NIC is in AdHoc Mode.
65 - 430
b. What is the MAC address of the computer? Provide this information to your team partner so diagnostics can be performed. Answers will vary. Example: 00:07:EB:31:7C:12 c. Write your partners MAC address. Answers will vary. Example: 00:07:EB:45:7F:13
66 - 430
a. Click on the Site Survey button. This will start the Site Survey Passive mode. b. Click on the Setup button to start the Site Survey Setup mode. c. Type in the Destination MAC address of your partner's PC that was obtained. That is the PC that will be used for an ad hoc site survey. Try this a few different times with different members of the class.
d. Click the OK button to go back to the Ad Hoc Passive Mode Screen. e. Click the Start button to initiate an active mode site survey. f. What additional information was added to the Ad Hoc Site Survey Screen? The following fields appear in Ad Hoc Active Mode Screen: 1. Percent Complete 2. Percent Successful 3. Lost To Target 4. Lost to Source
67 - 430
1. What is the Status of the PC? Ad Hoc Mode 2. What is the SSID of the PC? Adhoc# (where # is the group number assigned by the instructor) 3. What is the Network Type of the PC? Ad hoc 4. What is the Power Save Mode of the PC? CAM
Note
Optional: Walk around the class and note the change in Signal Strength and Signal Quality.
68 - 430
a. How many Broadcast packets were received? Answers will vary. Example: 214 b. How many Broadcast packets were transmitted? Answers will vary. Example: 235 c. Exit from the Ad Hoc Statistics screen by selecting OK.
69 - 430
If using a laptop, answer the following questions. a. Move the laptop around the area. Note how the Link Status Meter behaves. What is the approximate distance that the two computers can be apart before they disassociate? Answers will vary. Example: 2000ft b. Move one of the computers behind a metal bookcase or file cabinet. Was there a noticeable change in signal quality or signal strength? Answers will vary. Example: Yes c. Try this same experiment with other materials such as the glass window, walls, desks, plastic objects. Which of the materials had the greatest effect on the signal quality or signal strength? Answers will vary. Example: wall d. If a 2.4 GHZ phone is available, activate the talk button near one of the computers. Note the Link Status Meter. What happens to the signal quality or signal strength? Answers will vary, but most AP and/or clients should become disassociated to each other. e. Move the computer behind a wooden door and note the Link Status Meter. Did the wooden door have any effect on the signal quality or signal strength? Answers will vary, but generally wooden doors without any metal will have little, if any, effect on the signal quality or signal strength.
Scenario 2Setup a network game or program that requires network connectivity between PCs. Determine if there are any performance issues. Have other teams change to the adhoc network by matching the SSID and moving into the same IP subnet. Determine if there is a point at which network performance is an issue. Remember that network connectivity is more than ping or telnet traffic. Network application and user demands must always be tested to assure proper network performance after any wireless installation. Scenario 3Setup a PC as an mp3 file server and stream music across the wireless adhoc network. Determine if there are any performance issues. Have other teams change to the adhoc network by matching the SSID and moving into the same IP subnet. Determine if there is a point at which network performance is an issue.
Step 9 Create an AdHoc Network with Internet connection sharing (OPTIONAL LAB)
Is it necessary to purchase an AP in order to share the fast broadband connection at home? This lab is very similar to using a cross-connect cable for a small PC network, but without the use of the router or additional cables.
71 - 430
c.
72 - 430
Objective
Each team will configure several personal computers to communicate with each other without an AP or cables.
Scenario
Several PCs equipped with wireless client adapters will be needed. They should be installed and setup. This lab will cover the Cisco Aironet IEEE 802.11a/b/g Wireless Adapter and how to configure the associated Aironet Desktop Utility (ADU) to allow them to connect together as a network without an AP. Other Cisco 802.11a and 11b clients, which utilize the Aironet Client Utility (ACU), can be used to create a mixed Ad Hoc environment, however students must follow instructions covered in the appropriate lab or configuration guide. Furthermore, students can utilize other vendor wireless adapters to apply skills learned in this lab.
Topology
Preparation
Prior to this lab, all the PCs should be equipped with working Cisco Aironet Client Adapters. The Aironet Desktop Utility should be installed on the computers. It is very important for the instructor to assign team numbers. Also, unique IP Addresses should be assigned to each client adapter or personal computer within each team to avoid IP conflicts. Each team should use the same SSID for each PC in the pod to ensure that the computers associate to each other. The SSID to be used for all PCs is adhocP (where P is the group number assigned by the instructor). The instructor should help students understand the addressing scheme. Using the information in the following chart, configure the host computers. Note that no default gateway is needed. By assigning unique IP addresses and SSIDs, the students avoid conflict with other teams.
Copyright 2003, Cisco Systems, Inc.
73 - 430
Team 1
Client2a Client2b
Client3a Client3b
The following tools and resources will be required to complete this lab: Two PCs equipped with the Cisco Aironet Client Adapter per group. One of the computers should be a laptop for mobility purposes.
74 - 430
e. Click the Advanced tab to set the Network Type for Ad Hoc. The default setting is Infrastructure. Click OK to save your settings.
Step 2 Select the profile named adhocP (where P is the team number)
In order to connect to the peer, the ad hoc profile on both computers must be activated. a. From the Profile Management tab, click the adhocNET profile and then click the Activate button to use the ad hoc profile. b. The computers should associate. If association does not occur, troubleshoot as needed.
75 - 430
Step 5 Create an AdHoc Network with Windows XP Internet connection sharing (OPTIONAL)
Is it necessary to purchase an AP in order to share the fast broadband connection at home? This lab is very similar to using a cross-connect cable for a small PC network, but without the use of the router or additional cables.
76 - 430
f.
77 - 430
Objective
In this lab, the student will learn the importance of the output power of the transmitting wireless device. Students will calculate the amount of power actually transmitted from a wireless transmitting device. This will be done through the antenna element, the Effective Isotropic Radiated Power (EIRP) based on the type of antenna, cabling, connectors, and the transmitting device setting being used.
Scenario
Upon completion of this lab, students will calculate potential range of the radiated wave signal transmitted by wireless devices. Students will also convert all radio frequency (RF) signal ratings into a common decibel (dB) unit in order to calculate power gain or loss.
Preparation:
Prior to the lab, students should review the course materials up to 3.2.3.
Additional Materials
http://www.zytrax.com/tech/wireless/calc.htm http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a00800e90fe.shtml#topi c1 http://www.cisco.com/en/US/products/hw/wireless/ps458/products_installation_guide_chapter09186a 008007f747.html http://www.cisco.com/en/US/products/hw/wireless/ps469/products_data_sheet09186a008008883b.ht ml Students should research the Cisco website for the following information if needed: Technical specifications of the power output in decibels (milliwatts) of the wireless devices used. AP and client adapters are examples of these devices. Technical specifications of the gain in decibels referenced to an isotropic antenna (dBi) of various wireless device antennas. Technical specifications of the gain/loss in decibels (dB) of various wireless device cables Technical specifications of the gain/loss in decibels (dB) of various wireless device connectors. These connectors are necessary when cables have to be joined for longer cable lengths.
78 - 430
Maximum Power Levels ETSI Band (GHz) EIRP 2.4 100 mW 20 dBm 5.15 5.25 200 mW 22 dBm 5.25 5.35 200 mW 22 dBm 5.470 5.725 1000 mW 30 dBm 5.725 5.825 25 mW 14 dBm
FCC Band (GHz) Conducted Power EIRP 2.4 4000 mW 36 dBm 5.15 5.25 40 mW 200 mW 22 dBm 5.25 5.35 250 mW 1000 mW 30 dBm 5.470 5.725 N/A 5.725 5.825 1000 mW P2MP 4 W ( 36 dBm ) P2P 200 W ( 53 dBm )
79 - 430
Complete the missing values below. If help is needed, use the Calculating Decibels Interactive Activity. An increase of: 3dB 3dB 10dB 10dB 15dB 15dB 20dB 20dB 25dB 25dB 30dB 30dB Additional Practice: An increase of: 5dB 5dB 40dB 40dB A decrease of: Produces: 3 times the transmit power Decreases transmit power 3 times 10000 times the transmit power Decreases transmit power 10000 times A decrease of: Produces: Double transmit power Half transmit power 10 times the transmit power Decreases transmit power 10 times 32 times the transmit power Decreases transmit power 32 times 100 times the transmit power Decreases transmit power 100 times 316 times the transmit power Decreases transmit power 316 times 1000 times the transmit power Decreases transmit power 1000 times
Another way to look at this formula is where Pfinal = Pref * 10 (dB/10). In the example above, a 2.4 GHz AP is set to 100mW and has a 2.2 dBi antenna.
80 - 430
Now calculate the following scenarios. Use the Using Decibels Interactive Activity AP Power 1 mW 5 mW 50 mW 100 mW 100 mW Antenna 2.2 dBi 6 dBi 9 dBi 6 dBi 22 dBi Power output (in mW) 1.66 20 397 398 15849
1. What is the maximum allowable output power in dBm and Watts for the 2.4 GHz band? FCC: In Point-to-Multipoint systems, the FCC has limited the maximum EIRP (effective isotropic radiated power) to 36dBm 4W EIRP maximum ETSI: 100 mW EIRP maximum 2. What is the maximum allowable output power in dBm and Watts for the 5 GHz band? See table in the Additional Materials Section 3. Why is it necessary for regulatory bodies to define maximum power levels? To avoid interference with other frequencies operating within the same frequency range. 4. What power levels can be set for the 2.4 GHz radio on an AP 1100? 350? 1200? 1 | 5 | 20 | 30 | 50 | 100 | maximum 5. What power levels can be set for the 2.4 GHz radio on an PCM 350 NICs? 1 | 5 | 20 | 30 | 50 | 100 6. What power levels can be set for the 5 GHz radio on an AP 1200? 5 GHz not available on the 1100 and 350 series 5 | 10 | 20| 40 | maximum on the 1200 7. What are the approximate dBm values for each of the following power levels? dBm 0 dBm 7 dBm 13 dBm 15 dBm 17 dBm 20 dBm mw 1mW 5mW 20mW 30mW 50mW 100mW
when referring to dipole antennas. Antennas are compared to this ideal measurement, and all FCC calculations use this measurement (dBi.) Dipole antennas are more real world antennas. While some antennas are rated in dBd, the majority use dBi. The power rating difference between dBd and dBi is approximately 2.2; that is, 0dBd = 2.2dBi. Therefore, an antenna rated at 3dBd is rated by the FCC (and Cisco) as 5.2dBi. Example 1: Description AP Antenna gain: Antenna Cable loss: Cisco Part Number AIR-AP1200-A-K9 AIR-ANT2012 AIR-CAB050LL-R 20 dBm 6 dBi -3.35 dBi EIRP = 22.65 dBm Example 2: Description A Cisco Aironet Bridge 50 foot antenna cable solid dish antenna Cisco Part Number AIR-BR350-A-K9 AIR-CAB050LL-R AIR-ANT3338 EIRP Power 20 dBm 3.35 dB loss 21 dBi gain 37.65 dBm Power
a. Which example is permissible according to local regulatory guidelines? Answers will vary. Example: Example 1 Calculate the EIRP for the following: AP Output 20-dBm 17-dBm 15-dBm 13-dBm 7-dBm 0 dBm Antenna Gain 12 dBi 5.2 dBi 21 dBi 8.5 dBi 2.2 dBi 2.2 dBi EIRP 32 22.5 36 21.5 9.2 2.2
b. What are the primary hardware factors involved that affect signal distance? Transmitter power Cable losses between transmitter and its antenna Antenna gain of the transmitter Localization of the two antennas (how far apart, are there obstacles between them) Receiving antenna gain Cable losses between receiver and its antenna Receiver sensitivity
82 - 430
Objective
Design the following five different network topologies with the Cisco Network Design (CND) software: Ad hoc network Basic Service Set (BSS) Network Extended Service Set (ESS) Network Basic home network Enterprise network (optional)
Scenario
Network architecture is a roadmap and guide for ongoing network planning, design, and implementation. It provides a logical framework that unifies disparate solutions onto a single foundation. Once an organization has developed network architecture, they will then have a framework in place for more informed decision-making. This will include appropriate investments in network technologies, products, and services.
Preparation
The instructor will provide each student team with a copy of the CND software. (Optional: This lab can be performed with any other graphical application software or drawing materials the instructor has available.) The student will review and understand FWL chapter 4 before doing the lab exercise.
Step 1 Load the CND or designer software, if it has not been loaded on the PC
Open the Cisco Network Design software. Use the help feature to get acquainted with the configuration settings of the software.
Objective
In this lab, the student will assign basic parameters to the AP using the GUI and IOS CLI. The Express Setup page will also be accessed through a web browser to assign the IP address, subnet mask, default gateway, and SSID to the AP.
Scenario
Basic configuration of an AP can be done through the GUI or IOS CLI.
Topology
Preparation
The student PC should be connected to the AP through an isolated wired network or crossover cable. The AP should be set to factory defaults.
One AP The AP power supply or source A PC (PC1) that is connected to the same wired network as the AP A wireless PC or laptop (PC2)
Copyright 2003, Cisco Systems, Inc.
Additional Materials
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_installation_and_configuration_gu ide_book09186a0080147d69.html
Command List
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command configure terminal hostname interface bvi1 ip address interface dot11radio 0 station role repeater | root [ fallback { shutdown | repeater } ] Description Enter Global configuration mode Set the hostname on the device Enter the virtual interface for the AP Set the IP address and subnet mask on the device Enter the device radio interface Set the AP role. Set the role to repeater or root. (Optional) Select the fallback role of the radio. If the Ethernet port of the AP is disabled or disconnected from the wired LAN, the AP can either shut down its radio port or become a repeater AP associated to a nearby root AP. Create an SSID and enter SSID configuration mode for the new SSID. The SSID can consist of up to 32 alphanumeric characters. SSIDs are case sensitive. Note: Do not include spaces or underscore characters in SSIDs. enable password password The default password is Cisco. This commands allows an administrator to change the password The default enable password is Cisco.
ssid ssid-string
The default is level 15 (privileged EXEC level). The password is encrypted before it is written to the configuration file. View the connected wireless clients
Display the current configuration of the device Display the startup configuration of the device Save the entries into the configuration file Display interface information of the device
89 - 430
a. Connecting a Cisco rollover cable (console cable) between PC1 and the AP b. Open a terminal emulator.
c.
Enter these settings for the connection: Bits per second (baud rate): 9600 Data bits: 8 Parity: none Stop bits: 1 Flow control: none
d. Press return to get started e. Now apply the AP power by plugging in the power supply cable or powered Ethernet cable. Hold the MODE button until the Status LED turns amber (approximately 1 to 2 seconds), and release the button. The AP reboots with the factory default values including the IP address. Without a connected DHCP server, the AP will default to 10.0.0.1/27.
90 - 430
flashfs[0]: 141 files, 6 directories flashfs[0]: 0 orphaned files, 0 orphaned directories flashfs[0]: Total bytes: 7741440 flashfs[0]: Bytes used: 3331584 flashfs[0]: Bytes available: 4409856 flashfs[0]: flashfs fsck took 12 seconds. Reading cookie from flash parameter block...done. Base ethernet MAC Address: 00:0b:fd:4a:70:0c Initializing ethernet port 0... Reset ethernet port 0... Reset done! ethernet link up, 100 mbps, full-duplex Ethernet port 0 initialized: link is up button pressed for 5 seconds process_config_recovery: set IP address and config to default 10.0.0.1 Loading "flash:/c1200-k9w7-mx.122-11.JA/c1200-k9w7-mx.122-11.JA"...############# ################################
c.
A log in screen appears. Type in the password of Cisco (case sensitive) and click OK.
d. When the AP HOME page appears, click Express Setup if the Express Setup does not appear.
91 - 430
e. Type a system name of PodP (where P is the Pod or Team number) for the AP in the System Name field. f. Select Static IP as a configuration server protocol from the Configuration Server Protocol selections.
Note If using the BR350 in AP mode, the VxWorks display will be slightly different than the IOS GUI display. These can allow two additional teams to complete the labs. All students should complete the labs with the new 1200 Cisco GUI. If students have available time, then the same labs can be completed using the BR350 in AP mode, remembering the user interface is different. This will allow students to be able to configure legacy Cisco APs such as the AP 340, AP 350, and BR350 in AP mode.
92 - 430
a. Type the IP address in the IP Address field. What IP address will be assigned to this AP? 10.0.P.1 (Where P is the assigned pod number) b. Enter an IP subnet mask in the IP Subnet Mask field. What Subnet mask will be assigned to this AP? Write the answer in dotted decimal notation. 255.255.255.0 What Subnet mask in binary. 11111111.11111111.11111111.00000000 c. Enter the IP address of the default Internet gateway in the Default Gateway field. Assume the router address is 10.0.P.254.
d. Leave the SNMP Community field alone at this time. e. Type an SSID for the AP in the Radio Service Set ID (SSID) field. What SSID will be assigned to this AP? APP (where P is the assigned pod number) f. Verify the AP Root: as the network role for the AP from the Role in Radio Network.
g. Select Throughput: as the Optimize Radio Network. h. Click OK. i. j. The connection will be lost. Reconfigure the IP address, subnet mask and gateway on PC1? 1. IP address 2. Subnet Mask 3. Gateway k. 10.0.P.10 255.255.255.0 10.0.P.254
Reconnect to the AP from PC1 web browser and verify the settings.
93 - 430
a. Go to the ASSOCIATIONS Page to check the wireless connection. 1. Does the Client Name appear which was previously configured? 2. Record the MAC Addresses of the devices associated to this AP. One of these should be the MAC Address of the laptop or desktop configured in Step 4. MAC ADDRESS Answers will vary according to the connected devices. Example: 000750cae208 b. Now check to see if the ACU icon in the system tray is green, which indicates a successful link to the AP. Double click on the icon to verify the correct AP Name and AP IP Address.
Record the values below. APP. and 10.0.P.1 (wehre P is the assigned pod number) c. Now check to see if a connection to the AP using a web browser can be achieved from the wireless device. Enter http://10.0.P.1 for the URL within the browser. Did the AP GUI display?
d. Test connectivity to other devices by way of ping, Telnet, http, and ftp. This will vary depending on the devices connected and configured on the wired network.
94 - 430
Radio system is ready for reload. *Mar 1 00:31:09.103: %SYS-5-RELOAD: Reload requested by console. ...
Note If you are connected to the AP using a Telnet session, you lose your connection to the AP when you assign a new IP address to the BVI. If you need to continue configuring the AP using Telnet, use the new IP address to open another Telnet session to the AP.
Display the condition and information of the device interfaces. PodP#show interfaces
Make sure to check or configure the TCP/IP settings of the laptop or desktop to connect to the proper IP network. If a DHCP server is running, configure TCP/IP to receive the address automatically, or configure static IP setting. d. Now check to see if the ACU icon in the system tray is green, which indicates a successful link to the AP. Double click on the ACU icon to verify the correct AP Name and AP IP Address.
c.
Record the values below? APP. and 10.0.P.1 (where P is the assigned pod number)
98 - 430
Lab 5.2.4 Using features of the Internetworking Operating System (IOS) command line interface (CLI)
Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two.
Objective
In this lab, the student will learn the following objectives: Command Line Interface help features Abbreviated commands Using the no command to remove config statements Command History Editing features
Scenario
Students will learn the features of the AP Internetworking operating system (IOS).
Topology
99 - 430
Preparation
Team 1 2
Tools and Resources
Each team will need: The AP A PC or laptop Console cable
Additional Materials:
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_installation_and_configuration_gu ide_book09186a0080147d69.html
Command List:
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command help ? command? command keyword ? abbreviated-commandentry? no history Description Obtains a brief description of the help system in any command mode. Lists all commands available for a particular command mode. Lists the associated keywords for a command. Lists the associated arguments for a keyword. Obtains a list of commands that begin with a particular character string. Use the no form to disable a feature or function or reverse the action of a command The number of commands that are displayed is determined by the setting of the terminal history global configuration command and history line configuration command. The number of commands that are displayed is determined by the setting of the terminal history global configuration command and history line configuration command. While in privileged EXEC mode, list the last several commands that you just entered.
terminal history
show history
100 - 430
Recall commands in the history buffer, beginning with the most recent command. Repeat the key sequence to recall successively older commands. Return to more recent commands in the history buffer after recalling commands with Ctrl-P or the up arrow key. Repeat the key sequence to recall successively more recent commands.
101 - 430
2. What command is used to check the existing startup configuration? show startup-config
Session number to resume Create a temporary Access-List entry Create a temporary Access-List entry manage archive files Change current directory Reset functions Manage the system clock Enter configuration mode Open a terminal connection Copy from one file to another Debugging functions (see also 'undebug') Delete a file
Copyright 2003, Cisco Systems, Inc.
List files on a filesystem Turn off privileged commands Disconnect an existing network connection IEEE 802.11 commands Turn on privileged commands Erase a filesystem
To get help on a specific command, type the command name followed by the ? at the command prompt. Type configure ? at the command prompt to display the available options for the configure command: PodP#configure ? memory network overwrite-network terminal <cr>
PodP#configure
from NV memory from a TFTP network host NV memory from TFTP network host from the terminal
103 - 430
The Navigation keystrokes below help display the output as needed: Key Return Space any other key Action Scroll down one line. Scroll down one screen. Exit the output
104 - 430
105 - 430
Objective
In this lab, the student will learn to manage configuration and image files.
Scenario
Students will learn the file management features of the AP IOS and GUI.
Note The command outputs shown in this lab were produced in IOS version 11.
Topology
106 - 430
Preparation
Team 1 2
Additional Materials:
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_installation_and_configuration_gu ide_book09186a0080147d69.html SolarWinds TFTP http://www.solarwinds.net/Download-Tools.htm
Command List:
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command show file systems dir ping copy Description Display the available file systems on the AP View directory information Ping a IP address to test connectivity Move files between the AP and a backup server.
107 - 430
1. What command is used to check the existing running configuration? show running-cofing 2. What command is used to check the existing startup configuration? show startup-config c. Configure the AP according to the Preparation table. Also make sure the equipment is cabled and configured as shown in the Topology.
List all files List files recursively List files on all filesystems Directory or file name Directory or file name Directory or file name Directory or file name Directory or file name Directory or file name Directory or file name
108 - 430
b. List all files for the current directory. PodP#dir /all Directory of flash:/ 2 4 6 11.JA -rwx -rwx drwx 167 5 320 Mar 01 1993 00:12:51 Mar 01 1993 00:08:45 Jan 01 1970 00:07:15 env_vars private-config c1200-k9w7-mx.122-
7741440 bytes total (4412416 bytes free) c. View the NVRAM files. PodP#dir nvram: Directory of nvram:/ 30 31 -rw---0 0 <no date> <no date> startup-config private-config
32768 bytes total (32716 bytes free) d. View the System files. PodP#dir system: Directory of system:/ 2 1 dr-x -rw0 1748 <no date> <no date> memory running-config
No space information available e. View all files in all directories. PodP#dir all- filesystems:
Erase destination file system. Copy from bs: file system Copy from flash: file system Copy from ftp: file system Copy from null: file system Copy from nvram: file system Copy from rcp: file system Copy from current system configuration Copy from scp: file system Copy from startup configuration
Copyright 2003, Cisco Systems, Inc.
system: file system tftp: file system xmodem: file system ymodem: file system zflash: file system
b. Ping the TFTP server to check connectivity. Make sure the TFTP server is enabled and configured properly. PodP#ping 10.0.1.10 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.0.1.10, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms c. Save the current configuration to flash. PodP#copy run start d. Upload a configuration file from the AP running configuration to a TFTP server. PodP#copy running-config tftp://10.0.P.10 or PodP#copy run tftp Address or name of remote host []? 10.0.P.10 Destination filename [PodP-confg]? e. On PC1, verify the file is saved. Open the file with a text editor such as WordPad to verify the configuration. f. Upload a configuration file from an AP startup configuration to a TFTP server for storage. PodP#copy startup-config tftp://10.0.P.10 or PodP#copy start tftp Address or name of remote host []? 10.0.P.10 Destination filename [Podp-confg]? g. Modify the saved AP configuration on PC1. Change the hostname to PodPrestore h. Upload a configuration file TFTP server to the AP startup-config. PodP#copy tftp start Address or name of remote host []? 10.0.P.10 Destination filename [Podp-confg]? i. Verify the uploaded configuration file in NVRAM. PodP#show start
110 - 430
Maintaining a record of the AP System Software Version is important for security and operation. a. Open a browser on PC1. Enter the IP address of the AP in the URL locator. Press Enter. b. Login to the AP. c. From the Home page, go to the SYSTEM SOFTWARE Page. d. What is the Product/Model Number? AIR-AF 1220-IOS-UPGRD or similar e. What is the System Software Filename? AIR-AF 1220-IOS-UP GRD or similar
The SYSTEM SOFTWARE>Software Upgrade Page provides the easiest method to upgrade a system image. f. Click on the browse button to locate the desired Tar file located on PC1.
Note The AP image files are available at the following address: http://www.cisco.com/public/swcenter/sw-wireless3.shtml
111 - 430
i. j.
Click the Upgrade button. It is best to maintain a console connection to monitor the upgrade progress.
Note NEVER reboot once the upgrade process begins! It is a good practice to connect the AP to a UPS.
112 - 430
113 - 430
Objective
In this lab, the student will use the AP setting pages to enter speed and duplex information for the AP.
Scenario
This section describes how to configure the AP radio Ethernet and FastEthernet interfaces to lock in speed and duplex settings.
Topology
Preparation
Below are the basic settings to be applied to the AP. Team 1 2 AP Name Pod1 Pod2 SSID AP1 AP2 Address 10.0.1.1/24 10.0.2.1/24
114 - 430
a. If needed, console into the AP and configure the BVI IP address to 10.0.P.1/24. Set the hostname as well according to the Preparation table. Make sure the wired PC TCP/IP settings are configured according to the Topology. A wireless connection to the AP can also be used. 1. Record the configuration commands below needed for Step1a. For Pod1: ap(config)#hostname Pod1 Pod1(config)# Pod1(config)#interface bvi1 Pod1(config-if)#ip address 10.0.1.1 255.255.255.0 Pod1(config-if)#interface dot11radio 0 If 802.11a is available, then: Pod1(config-if)#ssid AP1 Pod1(config-if)#interface dot11radio 1 Pod1(config-if)#ssid AP1
115 - 430 Fundamentals of Wireless LANs v 1.2 Lab 5.3.5 Copyright 2003, Cisco Systems, Inc.
Pod1(config-if-ssid)# b. Open up a browser on PC1 and browse to the APs Home page
Browse to the EXPRESS SET-UP Page and verify the settings configured in Step 1 through GUI.
116 - 430
a. Go to the NETWORK INTERFACES>FastEthernet Page and click on the settings tab of the AP. b. The Enable Ethernet: setting should be set to Enable.
Note If the FastEthernet settings are modified while connected through the wired network, the connection may be lost. These will actually be modified in Step 4 through the Console. The Requested Duplex Setting should be set to Auto by default. In a production environment, the duplex should be locked into the optimum setting of the connected switch.
c.
The Requested Speed Setting should be set to Auto by default. In a production environment, the speed should be locked into the optimum setting of the connected switch.
117 - 430
b. Now see what duplex settings are possible. PodP(config-if)#duplex ? auto full half c. Enable AUTO duplex configuration Force full duplex operation Force half-duplex operation
d. Now see what speed settings are possible. PodP(config-if)# speed ? 10 100 auto Force 10 Mbps operation Force 100 Mbps operation Enable AUTO speed configuration
e. Now set the speed to 100 Mbps. PodP(config-if)#speed 100 PodP(config-if)#end f. Check the running configuration. PodP#show running-config g. Display the FastEthernet interface status
PodP#show interfaces fastEthernet 0 FastEthernet0 is up, line protocol is up Hardware is PowerPC405GP Ethernet, address is 000b.46b8.ca90 (bia 000b.46b8.ca90) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, MII ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:23:18, output 00:01:54, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue :0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 1783 packets input, 164809 bytes Received 29 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 118 - 430 Fundamentals of Wireless LANs v 1.2 Lab 5.3.5 Copyright 2003, Cisco Systems, Inc.
0 watchdog 0 input packets with dribble condition detected 1141 packets output, 449852 bytes, 0 underruns 0 output errors, 0 collisions, 4 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out
PodP# i. Now check the detailed status of all the interfaces PodP#show interfaces
119 - 430
Objective
In this lab, the student will use the Radio 802.11b-setting page to enter basic channel and data rate information for the AP radio. The Radio 802.11b page will also be accessed to enter basic settings for the transmit power, antennas, and operating thresholds on the AP.
Scenario
This section describes how to configure the AP radio. Use the AP Radio interface pages in the management system will be used to set the radio configuration.
Topology
120 - 430
Preparation
The student PC should be connected to the AP through an isolated wired network or crossover cable. The AP should be set to factory defaults. A DHCP service may be used to assign an address to the AP. Team 1 2 AP Name Pod1 Pod2 SSID AP1 AP2 Address 10.0.1.1/24 10.0.2.1/24
a. Open a browser and type in the IP address of the AP that was assigned in the Preparation section of this lab. Log into the AP by pressing TAB while in the username box then type in the default password "Cisco".
121 - 430
Note
The password is case sensitive. This should open the AP HOME page.
b. Obtain the AP information from this page. It is important for the network administrator to be familiar with the settings on the network equipment. c. Are there any Clients or Repeaters connected to the AP? What is the number for each? Answers will vary according to the devices connected to the AP. Example: No, Clients: 0 Repeaters: 0 d. What is the IP Address of the AP? Answers will vary according to the equipment that is issued. Example: 10.0.1.1 e. What Network Interfaces are available? Answers will vary according to the equipment that is issued. Example: FastEthernet, Radio 0-802.11B, Radio 1-802.11A f. What is the Ethernet/FastEthernet MAC address? Answers will vary according to the equipment that is issued. Example: 000b.fd4a.700c g. If available, what is the Radio 802.11b MAC address? Answers will vary according to the equipment that is issued. Example: 0007.85b3.c270 h. If available, what is the Radio 802.11b Transmission rate? Answers will vary according to the equipment that is issued. Example: 11.0Mb/s i. If available, what is the Radio 802.11a MAC address? Answers will vary according to the equipment that is issued. Example: 000b.fd01.05b7 j. If available, what is the Radio 802.11a Transmission rate? 54.0Mb/s
122 - 430
If available, click on the NETWORK INTERFACES>Radio0-802.11B. Next, click the SETTINGS tab. Record the following settings from the Radio Interface page: a. What is the Enable Radio setting and Current Status? Answers will vary. Example: Enable b. What is the role of this AP? The role of this AP should be AP Root. c. What speeds are configured for the data rates? ALL DATA RATES should be checked for Require. d. What is the Enable Radio setting and Current Status? Answers will vary. Example: Enable e. What is the role of this AP? The role of this AP should be AP Root. f. What speeds are configured for the data rates? ALL DATA RATES should be checked for Require. Scroll down the Network Interface Settings page to view the information displayed in the figure for this step.
123 - 430
g. What is the Transmitter Power setting? Answer will vary. Example: Max h. What is the Default Radio Channel? Answer will vary. Example: channel 1, 6 or 11 i. What are the other settings on this page? Repeat the Network Interface Settings steps for the Radio1-802.11A. Network Interface Settings Radio Preamble Receive Antenna Transmit Antenna Aironet Extensions Ethernet Encapsulation Transform Reliable Multicast to RGB Public Secure Packet Forwarding Beacon Period Max. Data Retries Fragmentation Threshold Repeater Parent AP Timeout Beacon Period
124 - 430
a. To check which clients are associated to this AP, go to the ASSOCIATION page and click on the Association button. b. Record the MAC Addresses of the devices associated to this AP: MAC ADDRESS
c.
Test connectivity to other devices using ping, Telnet, http, and ftp. This will vary depending on the devices connected and configured on the wired network.
125 - 430
a. What is the Reliable Multicast to WGB setting? What wireless device does this setting pertain to? Answers will vary. Example: Enable b. What is Public Secure Packet Forwarding setting? Why would this be enabled? Answers will vary. Example: Disable c. What is the Beacon Period? What are the advantages and disadvantages of lowering or raising the value? Answers will vary. Example: 100 d. What is the Data Beacon Rate (DTIM)? What are the advantages and disadvantages of lowering or raising the value? Answers will vary. Example: 2 e. What is the Max Data Retries setting? What are the advantages and disadvantages of lowering or raising the value? Answers will vary. Example: 32 f. What is RTS Max Retries setting? What are the advantages and disadvantages of lowering or raising the value? Answers will vary. Example: 32 g. What is the Fragmentation Threshold? What are the units for this value? Answers will vary. Example: 2346, Unit is bytes
126 - 430 Fundamentals of Wireless LANs v 1.2 Lab 5.4.4 Copyright 2003, Cisco Systems, Inc.
h. What is the RTS Threshold setting? Answers will vary. Example: 2312 i. j. k. l. What is Repeater Parent AP timeout? Answers will vary. Example: Disabled What is Repeater Parent AP MAC 1 (optional)? Answers will vary. Example: Disabled What is Repeater Parent AP MAC 2 (optional)? Answers will vary. Example: Disabled What is Repeater Parent AP MAC 3 (optional)? Answers will vary. Example: Disabled m. What is Repeater Parent AP MAC 4 (optional)? Answers will vary. Example: Disabled
c.
Which channel setting had the best performance? Answers will vary. Example: Channel 1 2412 MHz
d. Which channel setting had the worst performance? Answers will vary. Example: Channel 11 2462 MHz e. Change the Transmitter Power settings and make note of any data rate performance or range. Was there any enhancement or degradation in the performance of the AP? With the instructors permission, see how far the wireless client can roam with the lowest/highest setting. Answers will vary. Example: Generally as you decrease the transmitter power settings your range decreases and the data rate will shift lower to accommodate the increased range. f. If there was, which Transmitter Power setting gave the furthest range or strongest signal? Answers will vary. g. Which Transmitter Power setting gave the fastest data rate? Answers will vary.
127 - 430 Fundamentals of Wireless LANs v 1.2 Lab 5.4.4 Copyright 2003, Cisco Systems, Inc.
Objective
In this lab, the student will enter basic channel and data rate information for the AP radio.
Scenario
This section describes how to configure the AP radio. Use the AP Radio interface pages in the management system will be used to set the radio configuration.
Topology
Preparation
Configure a PC and AP according to the Topology
128 - 430
Command List
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command Description enter global configuration mode enter the device radio interface. The number is 0 for 11b and 1 for 11a. Depending on the installed radio(s), one or both will be available. set the role of the AP device set the data rate of the AP set the power level output of the AP set the channel of the AP set world-mode on the AP set the preamble set the receive or transmit antenna
configure terminal interface dot11radio number station-role speed basic power client channel world-mode preamble antenna
Step 1 Connect to the AP
Connect to the AP using the console or telnet. Enter global configuration mode with the following command: PodP#configure terminal Enter configuration commands, one per line. PodP(config)#
129 - 430
<1-100> One of: 1 5 20 30 50 100 maximum Set local power to allowed maximum PodP(config-if)# Configure the AP radio power to 5mW. PodP(config-if)#power local 5 *Mar 1 02:07:19.457: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset *Mar 1 02:07:19.475: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up PodP(config-if)# When a client device associates to the AP, the AP sends the maximum power level setting to the client. Follow these steps to specify a maximum allowed power setting on all client devices that associate to the AP, the example below sets the radio transmit power to 100mW: PodP(config-if)#power client 100 PodP(config-if)# Now lower the setting to 5mw: PodP(config-if)#power client 5 *Mar 1 02:01:42.123: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset *Mar 1 02:01:42.141: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up PodP(config-if)#
131 - 430
Now assign a least congested channel setting for the AP. The example below sets the radio to the least congested channel setting: PodP(config-if)#channel least-congested *Mar 1 02:12:38.761: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset *Mar 1 02:12:39.760: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio 0, changed state to down *Mar 1 02:12:43.265: %DOT11-6-FREQ_USED: Interface Dot11Radio0, frequency 2412 selected *Mar 1 02:12:43.285: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up *Mar 1 02:12:44.267: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio 0, changed state to up PodP(config-if)# Notice the output on the console displays the AP selecting the frequency that is least congested at that point and time.
132 - 430
LongA long preamble ensures compatibility between the AP and all early models of Cisco Aironet Wireless LAN Adapters (PC4800 and PC4800A). If these client devices do not associate to your APs, you should use short preambles.
Follow these steps to disable short radio preambles: PodP(config-if)#no preamble-short *Mar 1 02:16:03.156: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset *Mar 1 02:16:03.174: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up PodP(config-if)# Follow these steps to enable short radio preambles: PodP(config-if)#preamble-short *Mar 1 02:16:24.843: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset *Mar 1 02:16:24.861: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up PodP(config-if)#
View the available antenna settings PodP(config-if)#antenna ? receive receive antenna setting transmit transmit antenna setting Follow these steps to set the AP receive and transmit to right: (the interfaces will reset after each change.) PodP(config-if)#antenna receive right PodP(config-if)#antenna transmit right PodP(config-if)# Follow these steps to set the AP receive and transmit to left: PodP(config-if)#antenna receive left PodP(config-if)#antenna transmit left
133 - 430 Fundamentals of Wireless LANs v 1.2 Lab 5.4.5 Copyright 2003, Cisco Systems, Inc.
PodP(config-if)# Follow these steps to set the AP back to receive and transmit to diversity: PodP(config-if)#antenna receive diversity PodP(config-if)#antenna transmit diversity PodP(config-if)#
Optional Steps for 802.11a radio if available Step 11 View the available 802.11a radio settings
The AP radio has many available settings. Use the following commands to view the available commands for the 802.11a radio: PodP(config)#interface dot11radio 1 PodP(config-if)# a. What command is needed to see the available commands in the interface mode?
134 - 430
135 - 430
Configure the client radio transmit power to 40 mW. d. What command is needed? PodP(config-if)#power client 40 Now lower the setting to 5mw. e. What command is needed? PodP(config-if)#power client 5
136 - 430
137 - 430
Objective
The student will extend the coverage of a basic service set topology by implementing an AP as a repeater.
Scenario
An AP can be configured as a repeater to extend the wireless infrastructure range or to overcome an obstacle that blocks radio communication. The repeater forwards traffic between wireless users and the wired LAN by sending packets to either another repeater or to an AP connected to the wired LAN. The data is sent through the route that provides the best performance for the client. In this lab, the Root AP will be PodP. The repeater AP will be PodQ. A chain of several repeater APs can be setup, but throughput for client devices at the end of the repeater chain will be quite low. Because each repeater must receive and then re-transmit each packet on the same channel, throughput is cut in half for each repeater you add to the chain.
Topology
138 - 430
Preparation
Team 1 AP Name Pod1 (root) P Pod2 (repeater) Q SSID AP12 AP12 Address 10.0.12.1/24 10.0.12.2/24
PC1 should be connected to the wired network. A second team can use the BR350s for the lab, however students must use the VxWorks GUI to configure the steps. It is recommended that students use IOS based APs first.
Additional Materials
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_installation_and_configuration_gu ide_book09186a0080147d69.html
Configure a client and make sure it can associate with the first AP and then the second AP. You will probably have to power off the AP that you are not testing. This will confimed that the APs are configured and operational and clients can connect to the APP.
140 - 430
c.
Verify the client is associated to the repeater using the Aironet Client Utility.
d. When the client is associated with the repeater, re-power the root AP. e. Once the root AP has booted, ping the root bridge from the client.
The repeater AP should also appear as associated with the root AP in the root APs Association Table. On PodP, verify that PodQ is connected. There may also be other wireless clients associated. a. In privilege mode of the repeater, enter the following command to view what information can be displayed Pod2#show dot11 associations ? 1. What information is available? H.H.H bss-only client repeater statistics | Detailed client status Detailed status of all clients Associations in BSS client information repeater information association statistics Output modifiers all-client
b. Now check the detailed status of all clients Pod2#show dot11 associations all-clients
Pod2#show dot11 associations all-client Address : 0007.85b3.8850 Name : Pod2 IP Address : 10.0.12.2 Interface : Dot11Radio 0 Device : ap1200-Parent Software Version : State SSID Hops to Infra Current Rate Key Mgmt type Supported Rates Signal Strength Signal Quality Power-save Packets Input Bytes Input 141 - 430 : : : : : : : : : Assoc AP12 0 11.0 NONE 1.0 2.0 5.5 11.0 -27 dBm 80 % Off Parent VLAN Association Id Encryption : : : : Our Parent 0 1 Off
Connected for : 2541 seconds Activity Timeout : 66 seconds Last Activity : 0 seconds ago Packets Output Bytes Output : 145 : 25975 Copyright 2003, Cisco Systems, Inc.
: 444 : 63984
: : : :
0 0 0 0
: 2 : 0
c.
In privilege mode of the repeater, verify that the laptop is associated. There may also be other wireless clients associated.
d. Check the detailed status of all clients Pod2#show dot11 associations all-clients
Pod2#show dot11 associations all-client Address : 0007.eb30.a37d Name : VIAO IP Address : 10.0.12.20 Interface : Dot11Radio 0 Device : 350-client Software Version : 5.20 State : SSID : Hops to Infra : Clients Associated: Current Rate : Key Mgmt type : Supported Rates : Signal Strength : Signal Quality : Power-save : Packets Input Bytes Input Duplicates Rcvd Decrypt Failed MIC Failed MIC Missing Address IP Address Device : : : : : : Assoc AP12 1 0 11.0 NONE 1.0 2.0 5.5 11.0 -32 dBm 88 % Off 333 20624 0 0 0 0 Parent : self VLAN : 0 Association Id : 3 Repeaters associated: 0 Encryption : Off Connected for : 2866 seconds Activity Timeout : 22 seconds Last Activity : 3 seconds ago Packets Output Bytes Output Data Retries RTS Retries : : : : 1 80 0 0
: 000b.be0e.27e5 : 10.0.12.8 : ap1200-Rptr Assoc AP12 1 0 11.0 NONE 1.0 2.0 5.5 11.0 -25 dBm 85 % Off 155 29388 0 0 0 0
Name : AP2 Interface : Dot11Radio 0 Software Version : 12.2 Parent : self VLAN : 0 Association Id : 2 Repeaters associated: 0 Encryption : Off Connected for : 2870 seconds Activity Timeout : 43 seconds Last Activity : 20 seconds ago Packets Output Bytes Output Data Retries RTS Retries : : : : 480 69571 4 0
State : SSID : Hops to Infra : Clients Associated: Current Rate : Key Mgmt type : Supported Rates : Signal Strength : Signal Quality : Power-save : Packets Input Bytes Input Duplicates Rcvd Decrypt Failed MIC Failed MIC Missing : : : : : :
1. Is the laptop associated? What information can be used to verify the connection? Yes; use the AP2#show dot11 associations command Pod2#show dot11 associations 802.11 Client Stations on Dot11Radio0: SSID [AP12] :
142 - 430 Fundamentals of Wireless LANs v 1.2 Lab 5.4.8 Copyright 2003, Cisco Systems, Inc.
MAC Address IP address Parent State 0007.85b3.8850 10.0.12.2 Assoc 0007.eb30.a37d 10.0.12.30 Assoc
Device
Name self
143 - 430
Objective
Reset the bridge to factory defaults.
Scenario
You can use the web-browser interface or the CLI to reset the access point/bridge to a factory default configuration. The following steps reset all configuration settings to factory defaults, including passwords, WEP keys, the IP address, and the SSID.
Note The default username and password are both Cisco, which is case-sensitive.
Topology
144 - 430
Preparation
The students will read and familiarize themselves with the concepts in Chapter 6 prior to attempting this lab.
Note: Depending on the terminal emulation software you are using, you may have to press Esc twice to access the boot loader.
d. At the bridge: prompt, enter the following command to show a directory of the flash file system similar to the directory shown below: bridge: dir flash: Directory of flash:/ 3 4 139 140 143 -rwx drwx -rwx -rwx -rwx 1140 384 5 70 <date> config.txt <date> c1310-k9w7-mx.122-15.JA <date> private-config <date> env_vars
181248 bytes available (7560192 bytes used) The files config.txt and env_vars must be deleted or renamed. To keep a copy of the configuration, these files must be renamed. If the files are renamed, they can be used to restore the configuration while allowing you to change the password. e. Delete both files to restore the bridge to factory defaults. bridge: delete flash:config.txt flash:oldcfg.txt bridge: delete flash:/env_vars flash:/oldenvars f. Issue the boot command to reboot the bridge. bridge: boot g. The bridge will reboot with factory default values including the IP address (set to receive an IP address using DHCP). To obtain the units new IP address, you can use the show interface bvi1 CLI command. If the unit does not receive an IP address from a DHCP server, the IP address is set to 10.0.0.1. Note: Do not interrupt the boot process to avoid damaging the configuration file. Wait until the bridge Install Mode LED begins to blink green before continuing with CLI configuration changes. You can also see the following CLI message when the load process has finished: Line protocol on Interface Dot11Radio0, changed state to up.
146 - 430
Objective
In this lab, the student will assign basic parameters to the bridge using the GUI and IOS CLI. The Express Setup and Express Security pages will also be accessed through a web browser to assign the IP address, subnet mask, default gateway, and SSID to the bridge.
Scenario
Basic configuration of a bridge can be done through the GUI or IOS CLI.
Topology
Preparation
The student PC should be connected to the bridge through an isolated wired network or crossover cable. The bridge should be set to factory defaults.
Command List
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command configure terminal hostname interface bvi1 ip address interface dot11radio 0 Description Enter Global configuration mode Set the hostname on the device Enter the virtual interface for the bridge Set the IP address and subnet mask on the device Enter the device radio interface Set the bridge role. Set the role to install, non-root, root or workgroup bridge. (Optional) If root mode is selected, the bridge can be used as a root bridge or a root AP. When set to ap-only mode, the fallback role of the radio can be selected as repeater or shutdown. If the Ethernet port of the bridge is disabled or disconnected from the wired LAN, the bridge can either shut down its radio port or become a repeater bridge associated to a nearby root bridge. Create an SSID and enter SSID configuration mode for the new SSID. The SSID can consist of up to 32 alphanumeric characters. SSIDs are case sensitive. Note: Do not include spaces or underscore characters in SSIDs. The default password is Cisco. This commands allows an administrator to change the password The default enable password is Cisco. enable secret password enable password level level password show dot11 associations show running-config show startup-config copy running-config startupconfig show interfaces logging console 4 The default is level 15 (privileged EXEC level). The password is encrypted before it is written to the configuration file. View the associated wireless devices
ssid ssid-string
Display the current configuration of the device Display the startup configuration of the device Save the entries into the configuration file Display interface information of the device Turn off notification logging to avoid interruptions during configuration.
c.
Enter these settings for the connection: Bits per second (baud rate): 9600 Data bits: 8 Parity: none Stop bits: 1 Flow control: none
e. Type a system name of BPodP (where P is the Pod or Team number) for the bridge in the System Name field. f. Select Static IP as a configuration server protocol from the Configuration Server Protocol selections.
a. Type the IP address in the IP Address field. b. Enter an IP subnet mask in the IP Subnet Mask field. c. Enter the IP address of the default Internet gateway in the Default Gateway field. Assume the router address is 10.0.P.254.
d. Leave the SNMP Community field at the default value. e. Set Role in Radio Network to Root.
151-430 Fundamentals of Wireless LANs v 1.2 Lab 6.2.2 Copyright 2003, Cisco Systems, Inc.
f.
Select Throughput for the Optimize Radio Network setting. Note: This setting will prevent association with 802.11b clients.
g. Click Apply.
Once the settings are applied the web connection to the bridge will be lost, since the PC and the bridge are no longer in the same IP subnet. a. Reconfigure the IP address, subnet mask and gateway on PC1 1. IP address 2. Subnet Mask 3. Gateway 10.0.P.10 255.255.255.0 10.0.P.254
b. Reconnect to the bridge from PC1 web browser and verify the bridge settings from the Express Setup page.
d. Now check to see if the ACU icon in the system tray is green, which indicates a successful association. Double click on the icon to verify the correct bridge Name and bridge IP Address.
e. Now check to see if a connection to the bridge using a web browser can be achieved from the wireless device. Enter http://10.0.P.1 for the URL within the browser. Did the bridge GUI display? f. Test connectivity to other devices by way of ping, Telnet, http, and ftp. This will vary depending on the devices connected and configured on the wired network.
! hostname PodP [output omitted] b. Display the condition and information of the device interfaces. PodP#show interfaces
d. Now check to see if the ACU icon in the system tray is green, which indicates a successful association. Double click on the ACU icon to verify the correct bridge Name and bridge IP Address.
Lab 6.2.4 Using Features of the Internetworking Operating System (IOS) command line interface (CLI)
Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two.
Objective
In this lab, the student will learn the following objectives: Command Line Interface help features Abbreviated commands Using the no command to remove config statements Command History Editing features
Scenario
Students will learn the features of the bridge Internetworking operating system (IOS).
Topology
157 - 430
Preparation
Team 1 2 System Name Pod1 Pod2 SSID bridge1 bridge2 Address 10.0.1.1/24 10.0.2.1/24
Command List:
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command help ? command? command keyword ? abbreviated-commandentry? no Description Obtains a brief description of the help system in any command mode. Lists all commands available for a particular command mode. Lists the associated keywords for a command. Lists the associated arguments for a keyword. Obtains a list of commands that begin with a particular character string. Use the no form to disable a feature or function or reverse the action of a command The number of commands that are displayed is determined by the setting of the terminal history global configuration command and history line configuration command. The number of commands that are displayed is determined by the setting of the terminal history global configuration command and history line configuration command. While in privileged EXEC mode, list the last several commands that you just entered. Recall commands in the history buffer, beginning with the most recent command. Repeat the key sequence to recall successively older commands. Return to more recent commands in the history buffer after recalling commands with Ctrl-P or the up arrow key. Repeat the key sequence to recall successively more recent commands.
History size
terminal history size show history Press Ctrl-P or the up arrow key. Press Ctrl-N or the down arrow key.
158 - 430
__________________________________________________________________________
2. What command is used to check the existing startup configuration?
__________________________________________________________________________
159 - 430
Session number to resume Create a temporary Access-List entry Create a temporary Access-List entry manage archive files Change current directory Reset functions Manage the system clock Enter configuration mode Open a terminal connection Copy from one file to another Debugging functions (see also 'undebug') Delete a file List files on a filesystem Turn off privileged commands Disconnect an existing network connection
Copyright 2003, Cisco Systems, Inc.
To get help on a specific command, type the command name followed by the ? at the command prompt. Type configure ? at the command prompt to display the available options for the configure command: PodP#configure ? memory network overwrite-network terminal <cr>
PodP#configure
from NV memory from a TFTP network host NV memory from TFTP network host from the terminal
The Navigation keystrokes below help display the output as needed: Key Return Space any other key Action Scroll down one line. Scroll down one screen. Exit the output
161 - 430
162 - 430
163 - 430
Objective
In this lab, the student will enter basic channel and data rate information for the bridge radio.
Scenario
This section describes how to configure the bridge radio. Use the bridge Radio interface pages in the management system will be used to set the radio configuration.
Topology
Preparation
Configure a PC and bridge according to the Topology
164 - 430
Command List
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command Description enter global configuration mode enter the device radio interface. The number is 0 for 11g. set the role of the bridge device set the data rate of the bridge set the power level output of the bridge set the channel of the bridge set world-mode on the bridge set the preamble set the receive or transmit antenna
configure terminal interface dot11radio number station-role speed basic power client channel world-mode preamble antenna
Step 1 Connect to the bridge
Connect to the bridge using the console or telnet. Enter global configuration mode with the following command: PodP#configure terminal Enter configuration commands, one per line. PodP(config)# End with CNTL/Z.
166 - 430
Configure the bridge radio power to 5mW. PodP(config-if)#power local cck 5 PodP(config-if)#
Note The 802.11g radio transmits at up to 100 mW for the 1, 2, 5.5, and 11Mbps data rates. However, for the 6, 9, 12, 18, 24, 36, 48, and 54Mbps data rates, the maximum transmit power for the 802.11g radio is 30 mW.
When a client device associates to the bridge, the bridge sends the maximum power level setting to the client. Follow these steps to specify a maximum allowed power setting on all client devices that associate to the bridge, the example below sets the radio transmit power to 100mW: PodP(config-if)#power client 100 PodP(config-if)# Now lower the setting to 5mw: PodP(config-if)#power client 5 PodP(config-if)#
Follow the steps below to assign a static channel setting for the bridge. The example below sets the radio to channel 1: PodP(config-if)#channel 1 PodP(config-if)# (or the channel frequency)
Now assign a least congested channel setting for the bridge. The example below sets the radio to the least congested channel setting: PodP(config-if)#channel least-congested PodP(config-if)#
168 - 430
169 - 430
*Mar 1 02:28:00.414: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset *Mar 1 02:28:00.414: %LINK-3-UPDOWN: Interface Virtual-Dot11Radio0, changed state to down *Mar 1 02:28:00.433: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up *Mar 1 02:28:01.432: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio 0, changed state to up
170 - 430
Objective
In this lab, the student will use the bridge setting pages to enter speed and duplex information for the bridge Ethernet interface.
Scenario
This section describes how to configure the bridge radio Ethernet and FastEthernet interfaces to lock in speed and duplex settings.
Topology
171 - 430
Preparation
Below are the basic settings to be applied to the bridge. Team 1 2 bridge Name Pod1 Pod2 SSID bridge1 bridge2 Address 10.0.1.1/24 10.0.2.1/24
172 - 430
Step 2 Configure data rate speed and Duplex of the FastEthernet interface
a. Go to the NETWORK INTERFACES>FastEthernet Page and click on the settings tab of the bridge.
c.
The Requested Speed and Duplex settings should be set to Auto by default. In a production environment, the speed should be locked into the optimum setting of the connected switch.
173 - 430
b. Now see what duplex settings are possible. PodP(config-if)#duplex ? auto full half c. Enable AUTO duplex configuration Force full duplex operation Force half-duplex operation
d. View possible speed settings: PodP(config-if)# speed ? 10 100 auto Force 10 Mbps operation Force 100 Mbps operation Enable AUTO speed configuration
e. Configure the speed to 100 Mbps. PodP(config-if)#speed 100 PodP(config-if)#end f. Check the running configuration. PodP#show running-config g. Display the FastEthernet interface status PodP#show interfaces fastEthernet 0
FastEthernet0 is up, line protocol is up Hardware is PowerPC405GP Ethernet, address is 000b.46b8.ca90 (bia 000b.46b8.ca90) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, MII ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:23:18, output 00:01:54, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue :0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 1783 packets input, 164809 bytes Received 29 broadcasts, 0 runts, 0 giants, 0 throttles
174 - 430
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog 0 input packets with dribble condition detected 1141 packets output, 449852 bytes, 0 underruns 0 output errors, 0 collisions, 4 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out
h. Quickly verify all the interfaces are up PodP#show ip interface brief PodP#show ip interface brief Interface Protocol BVI1 Dot11Radio0 Dot11Radio1 FastEthernet0 Virtual-Dot11Radio0 down Virtual-Dot11Radio1 down PodP# i. Now check the detailed status of all the interfaces PodP#show interfaces IP-Address 10.0.P.1 unassigned unassigned unassigned unassigned unassigned OK? Method Status YES other YES TFTP YES TFTP YES other YES TFTP YES TFTP up up up up down down up up up up
175 - 430
Objective
Configure a site-to-site bridged network.
Scenario
A remote location several miles away requires connectivity to the existing wired network. The two LAN segments will use a wireless bridge for their physical layer connection using two Cisco Aironet Bridges (BR350s).
Note This lab uses a different subnet mask to identify the two segments of the same network. These two segments, although separated by distance, remain part of the same LAN through the use of a Wireless physical layer link.
Topology
176 - 430
Preparation
In this lab, the following will be configured. Device Name BPod1 BPod2 Label BR1 BR2 SSID BR1 BR1 Address 10.0.1.1/16 10.0.2.1/16
Two wired LAN segments that will be bridged together Two Cisco BR350 PC with FTP server loaded and a file to transfer in the root directory of the FTP server
This lab uses a FTP client/server functionality. Download an evaluation version or freeware/shareware version to accomplish this lab. Use a search engine using the keywords 'ftp server downloads' as a start.
TO NETWORK
To AC Power
TO AP/BRIDGE
177 - 430
a. First, attach two rubber duck antennas to the RP-TNC connectors. b. Plug the RJ-45 Ethernet cable into the Ethernet port on the back of the bridge. Plug the other end of the Ethernet cable into the Cisco Aironet power injector TO AP/BRIDGE end. c. Connect the power cable into the inline power injector and to the receptacle.
Connect a nine-pin, male-to-female, straight-through serial cable to the COM port on a computer and to the RS-232 serial port on the bridge. (This cable ships with the bridge) a. Open a terminal emulator. b. Enter these settings for the connection: c. Bits per second (baud rate): 9600 Data bits: 8 Parity: none Stop bits: 1 Flow control: Xon/Xoff
Press = to display the home page of the bridge. If the bridge has not been configured before, the Express Setup page appears as the home page. If this is the case, go to Step 3.
d. If the bridge is already configured, the Summary Status page appears as the home page. When Summary Status screen appears, type :resetall, and press Enter.
Enter "YES" to confirm Resetting All parameters to factory defaults: YES 00:02:12 (FATAL): Rebooting System due to Resetting Factory Defaults *** Restarting System in 5 seconds...
e. Type yes, and press Enter to confirm the command. f. Power cycle the bridge by removing the power.
:resetall can only be issued within the first 2 minutes after power on.
Note
178 - 430
179 - 430
e. If the Express Setup Page does not appear, from the Summary Status Page click on the Setup hyperlink. This will bring up the Setup Page.
f.
Now click on the Express Setup link. This will now bring up the Express Setup Page.
180 - 430
Configure the following settings: Parameter a. System Name: b. Configuration Server Protocol: c. Default IP address: d. Default Gateway: e. Service Set ID: f. Role in Radio Network: BPod1 BPod1 None 10.0.1.1 10.0.1.254 BR1 Root Bridge BPod2 BPod2 None 10.0.2.1 10.0.1.254 BR1 Non-Root Bridge w/o Clients
g. Click Apply. The connection will drop. h. Configure the PCs i. j. PC1 with an IP address of 10.0.1.10/16 PC2 with an IP address of 10.0.2.10/16
Reconnect to the using the browser. Enter 10.0.P.1 and connect. Verify the settings. 1. What roles can the bridge serve in the network? Answer
181 - 430
a. From the Setup Page, Click on the Root Radio>Advanced link to go to the Radio Advanced page of the Non-Root Bridge.
b. Enter the MAC address of the Root Bridge into the Preferred AP 1: field.
182 - 430 Fundamentals of Wireless LANs v 1.2 Lab 6.3.6.1 Copyright 2003, Cisco Systems, Inc.
This can be found on the bottom of the Root Bridge or from the Root Bridge Home Page.
c.
d. Go to the Associations page of the Root Bridge. Is the Non-Root Bridge in the Association table? Yes
183 - 430
3. What is the speed limitation? Can be write speed of the PC if below 6Mbps. If it is above 6Mbps, then the limitation is the wireless link.
184 - 430
Objective
Configure a site-to-site bridged network.
Scenario
A remote location several miles away requires connectivity to the existing wired network. The two LAN segments will use a wireless bridge for their physical layer connection using two Cisco Aironet Bridges (BR1310s).
Note This lab uses a different subnet mask to identify the two segments of the same network. These two segments, although separated by distance, remain part of the same LAN through the use of a Wireless physical layer link.
Topology
185 - 430
Preparation
In this lab, the following will be configured. Device Name BPod1 BPod2 SSID BR1 BR1 Address 10.0.1.1/16 10.0.2.1/16
a. First, attach two rubber duck antennas to the RP-TNC connectors. b. Connect the Power Injector to the BR1310 using the RG-59 coax cables. c. Connect the power cord to the Power Injector.
186 - 430
d. When the terminal emulator is activated, press Enter. An Enter Network Password window appears. The default username is Cisco. The default password is Cisco. Both the username and password are case sensitive. e. Upon a success login, the bridge will display the user mode prompt. f. Enter the enabled mode by typing the enable command and providing the default password: Cisco. br>enable Password:***** br# g. Reset the bridge to factory defaults by entering the erase nvram command and confirming. br#erase nvram Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
e. The bridge Home page will open displaying the Summary Status of the bridge. Navigate to the Express setup page by selecting the Express Setup link from the left navigation bar. The Express Setup page will allow configuration of some basis settings.
187 - 430
Click Apply. The connection will drop. Reestablish the connection by changing the configuration of the PC to match the bridge. PC1 with an IP address of 10.0.1.10/16 PC2 with an IP address of 10.0.2.10/16
g. Browse to the configured IP address of the bridge. 1. What roles can the bridge serve in the network?
188 - 430
From the left navigation bar, select the Security>SSID Manager link to configure SSIDs on the bridges. a. From the Current SSID List, make sure that <NEW> is selected. Configure a new SSID for both bridges to the value: BR1. b. Leave all other fields at their default values. c. Click Apply to save the settings. d. After the page refreshes, there will be 2 SSIDs in the current list.
189 - 430
e. Scroll to the bottom and select the BR1 SSID for the Infrastructure SSID, and click the check box to force infrastructure devices to associate using this SSID. f. Click Apply to save your settings.
b. From the non-root bridge, navigate to the Settings tab of the Radio interface.
190 - 430
c.
Scroll to the bottom of the settings page to enter the root bridge radio MAC address in the Root Parent MAC address field. Click Apply to save the configuration.
1. Which devices are listed in the Association table for BR1? What device is the parent for this association?
__________________________________________________________________________
2. Which devices are listed in the Association table for BR2? What device is the parent for this association?
__________________________________________________________________________
191 - 430
__________________________________________________________________________
b. Test layer 7 connectivity by browsing to BR2 from PC1. Was this successful?
__________________________________________________________________________
192 - 430
Objective
In this lab, students will configure the identity services, IP routing table, console parameters, and the time server parameters of the bridge unit.
Scenario
Configuring services includes the following: The Boot Server page determines how the bridge obtains its IP address and assigns required identifiers. Configuring the Routing Services page controls how IP packets originating from the bridge are forwarded. The Console/Telnet page can set up essential system parameters. The Time Server menu page is used to set time parameters.
Topology
193 - 430
Preparation
The students will read and familiarize themselves with the concepts and procedures of Chapter 6 prior to the lab.
Select the Identity process, Configuration Server Protocol that the bridge will use. There are three options: None Disableb BOOTP and DHCP, which is the default setting BOOTP Configures BOOTP only DHCP Configures DHCP
For Root Units, select DHCP. For non-root units, select None. a. What is the BOOTP selection for? The BOOTP selection is a bootstrap protocol that allows the host device to configure itself with a scaled configuration file. The configuration file is most commonly embedded in the devices firmware.
194 - 430 Fundamentals of Wireless LANs v 1.2 Lab 6.4.4.1 Copyright 2003, Cisco Systems, Inc.
If the destination IP address exactly matches a host entry in the routing table, the packet is forwarded to the MAC address corresponding to the next-hop IP address from the table entry. If the destination address is on another subnet and matches the infrastructure portion of a net entry in the table (using the associated subnet mask), the packet is forwarded to the MAC address corresponding to the next-hop IP address from the table entry. In order to configure the IP Routing Table parameters, complete the following steps: If DHCP has been used for the identity process, the default gateway router IP Address will be in the default gateway field. If a static route is to be added for handling destination addresses, fill in the following fields: 1. Dest. Network: Answers will vary. Example: blank by default 2. Gateway: Answers will vary. Example: 255.255.255.255 by default 3. Subnet Mask: Answers will vary. Example: 255.255.255.0
195 - 430
In order to configure the Console/Telnet parameters, complete the following steps: Use the Console/Telnet setup page to configure the parameters for HyperTerminal and/or Telnet sessions to the bridge unit.
Document the following settings: a. Baud Rate 9600 b. Parity none c. Data Bits 8 d. Stop Bits 1 e. Flow Control Flow Control is Xon/Xoff flow control If remote access to the bridge is a concern, the Telnet feature of the bridge unit may be disabled by checking the Disabled button on this page.
196 - 430
Step 4 Configuring the time server parameters of the bridge unit to set the time
From the Setup page in the Services section, select the Time Server option.
Simple Network Time Protocol (SNTP) is a lightweight version of Network Time Protocol (NTP). NTP is designed for extreme accuracy, while SNTP is designed for easy synchronization. SNTP clients can obtain time form an NTP server. Even though SNTP is simple, it can easily provide accuracy within a few milliseconds. In order to configure the Time Server parameters of the bridge unit to set the time, complete the following steps: Use the Time Server Setup page to change the time settings. Change the time to one hour ahead. a. When would this step be necessary? The time changing utility is necessary when the time zone in your area changes and you wish to keep the time setting accurate. Change the time back to the current time.
197 - 430
Objective
In this lab, students will configure various services on the BR1310.
Scenario
The bridge Services configuration page is used to set parameters for various services, including: Telnet/SSH, CDP, DNS, Filters, HTTP, Proxy Mobile IP, QoS, SNMP, NTP, VLAN, STP, and ARP Caching.
Topology
Preparation
The students will read and familiarize themselves with the concepts and procedures of Chapter 6 prior to the lab.
198 - 430
_____________________________________________________________________________
b. Columns:
_____________________________________________________________________________
c. Lines:
_____________________________________________________________________________
If remote access to the bridge is a concern, the Telnet feature of the bridge unit may be disabled by checking the Disabled button on this page.
199 - 430
Step 3 Configuring the time server parameters of the bridge unit to set the time
From the Setup page in the Services section, select the NTP option.
NTP is designed for extreme accuracy and requires configuration of a Hostname or IP address of an NTP server. Time Settings can be manually entered if an NTP server is not available. In order to configure time parameters of the bridge, complete the following steps: a. Select the GMT Offset for your time zone from the drop down list. b. Select the daylight savings setting appropriate for your area. c. Manually set the date and time following the format provided in parenthesis. d. Click Apply to save these settings.
200 - 430
e. The time settings can be confirmed by causing a log entry to be entered. From the Express Setup page, change the bridge System Name and apply the new settings. f. Navigate to the Home page after the new name is saved. The Event Log should have an entry with the correct GMT date and time.
201 - 430
Objective
In this lab, the student will learn the features of the wireless bridge configuration dump and the process used for wireless bridge configuration and image load processes. Additionally, in this lab, the student will learn the process for distributing firmware and configurations.
Topology
Preparation
The students will read and familiarize themselves with the concepts in Chapter 6 prior to attempting this lab.
202 - 430
a. On PC1, open a web browser and access the bridge. From the Home page, click on the Setup tab.
203 - 430
c.
204 - 430
e. When the File Download screen appears, click the Save button.
205 - 430
f.
Choose a file name and location or click Save to accept the defaults. In this example, BPod1.ini was selected as the file name, and C:\Cisco directory was selected as the location to save the configuration file.
206 - 430
h. On PC1, open the configuration file with Notepad. Edit the sysName= value to BPod1backup. i. Save the changes and exit Notepad.
207 - 430
b. From the System Configuration Setup Page, click on the Browse button near the Additional System Configuration file: field.
c.
Choose the configuration file BPod1 that is to be loaded and click the Open button.
208 - 430
d. Click the Browser Update Now button to load the file. After about 10 seconds, the page will update. Notice the System name will change in the upper left corner. 8. Was it possible to load the saved configuration file into the current configuration of the bridge? How is this confirmed? Yes, the saved configuration file was successfully uploaded into the AP/bridges configuration.
a. Download the latest BR350 image from Cisco.com. Save the image file on PC1.
209 - 430
b. From the Cisco Services Setup Page, click on the Fully Update Firmware: Through Browser link.
c.
From the Update All Firmware Through Browser Page, click on the Browse across from the New File for All Firmware:
210 - 430
d. Select the downloaded BR350 image file and click the Open button.
f.
Note
211 - 430
a. Click on the Distribute Firmware to other Cisco Devices from the Cisco Services Setup page.
b. From the Distribute Firmware Page, choose the yes radio button on for the Distribute all firmware option.
212 - 430 Fundamentals of Wireless LANs v 1.2 Lab 6.5.3.1 Copyright 2003, Cisco Systems, Inc.
c.
The bridge will search for other bridges to distribute its firmware to, which is indicated by the SEARCHING status in the lower left hand corner of the page. If it locates a bridge, the distribution will occur automatically. If no other bridges are available, the status will display INACTIVE.
a. From the Cisco Services Setup page, click on the Manage System Configuration link.
213 - 430
b. From the System Configuration Setup Page, click on the Reset All System Factory Defaults button.
214 - 430
Objective
In this lab, the student will learn the features of the wireless bridge configuration file backup and image load processes.
Topology
Preparation
The students will read and familiarize themselves with the concepts in Chapter 6 prior to attempting this lab.
215 - 430
d. A warning window will display. Read the information in this window carefully before continuing with the HTTP upgrade. Click OK to continue.
217 - 430
e. An additional browser window will open to provide information about the upgrade process. Do not close this window or otherwise interrupt the upgrade process.
f.
If the bridge does not have room in flash for the new image, an error message will display. If this error is displayed, the image must be installed using the CLI.
218 - 430
extracting info (229 bytes) c1310-k9w7-mx.122-15.JA/ (directory) 0 (bytes) c1310-k9w7-mx.122-15.JA/html/ (directory) 0 (bytes) c1310-k9w7-mx.122-15.JA/html/level1/ (directory) 0 (bytes) extracting c1310-k9w7-mx.122-15.JA/html/level1/appsui.js (558 bytes) extracting c1310-k9w7-mx.122-15.JA/html/level1/back.htm (205 bytes) -- MORE -j. Enter the set BOOT command to designate the new image as the image that the bridge uses when it reboots. The bridge creates a directory for the image that has the same name as the image, and you must include the directory in the command. Your entry might look like this example:
Fundamentals of Wireless LANs v 1.2 Lab 6.5.3.2 Copyright 2003, Cisco Systems, Inc.
219 - 430
bridge: set BOOT flash:/c1310-k9w7-mx.122-15.JA/c1310-k9w7-mx.12215.JA k. Enter the set command to check the bootloader entries. bridge: set BOOT=flash:/c1310-k9w7-mx.122-15.JA/c1310-k9w7-mx.122-15.JA DEFAULT_ROUTER=10.0.0.2 IP_ADDR=10.0.0.1 NETMASK=255.255.255.0 l. Enter the boot command to reboot the access point. When the access point reboots, it loads the new image. Any previous configurations will be retained. bridge: boot
220 - 430
Objective
Configure a site-to-site bridge network separated by a Layer 3 device. Test the speed of the wireless bridge link.
Scenario
A remote location which is several miles away requires connectivity to the existing wired network. The connection can be bridged wirelessly with two BR350s. In large networks, it is necessary to provide Layer 2 broadcast control using routers.
Topology
221 - 430
Preparation
The instructor or students must cable and configure the perimeter routers in addition to the wired LAN. The routers Ethernet interfaces must be configured and enabled. Static routing should be configured on the routers. Ensure that the devices are configured according to the topology. The bridge devices should be configured as follows:
Two wired LAN segments that will be bridged together Two Cisco BR350s with 2.4dBi dipole antenna(s) Two dual Ethernet routers Two switches or hubs(optional)
Press = to display the home page of the bridge. If the bridge has not been configured before, the Express Setup page appears as the home page. (GO TO STEP 3)
d. If the bridge is already configured, the Summary Status page appears as the home page. When Summary Status screen appears, type :resetall, and press Enter.
Enter "YES" to confirm Resetting All parameters to factory defaults: YES 00:02:12 (FATAL): Rebooting System due to Resetting Factory Defaults *** Restarting System in 5 seconds...
e. Type yes, and press Enter to confirm the command. f. Power cycle the bridge by removing the power.
222 - 430
223 - 430
e.
If the Express Setup Page does not appear, from the Summary Status Page click on the Setup hyperlink. This will bring up the Setup Page.
f.
Now click on the Express Setup link. This will now bring up the Express Setup Page.
224 - 430
Configure the following settings: Parameter System Name: Configuration Server Protocol: Default IP address: Default Gateway: Service Set ID: Role in Radio Network: BPod1 BPod1 None 192.168.1.3 192.168.1.1 BR1 Root Bridge BPod2 BPod2 None 192.168.1.4 192.168.1.2 BR1 Non-Root Bridge w/o Clients
a. Click Apply. The connection will drop. b. What roles can the bridge serve in the network? Answer:
225 - 430
a. Reconnect to the using the browser. Enter 10.0.P.1 and connect. b. Verify the settings. 1. What other routing method can be used instead of EIGRP? RIP version 2, OSPF, Static routes 2. Can static routes be used? If so, what is the advantage/disadvantage? Yes, decrease overhead. Poor scalability
226 - 430
a. From the Setup Page, Click on the Root Radio>Advanced link to go to the Radio Advanced page of the Non-Root Bridge.
227 - 430
b. Enter the MAC address of the Root Bridge into the Preferred AP 1: field. This can be found on the bottom of the Root Bridge or from the Root Bridge Home Page.
228 - 430
c.
d. Go to the Associations page of the Root Bridge. 1. Is the Non-Root Bridge in the Association table? Yes
229 - 430
Objective
Configure a site-to-site bridge network separated by a Layer 3 device. Test the speed of the wireless bridge link.
Scenario
A remote location which is several miles away requires connectivity to the existing wired network. The connection can be bridged wirelessly with two BR350s. In large networks, it is necessary to provide Layer 2 broadcast control using routers.
Topology
230 - 430
Preparation
The instructor or students must cable and configure the perimeter routers in addition to the wired LAN. The routers Ethernet interfaces must be configured and enabled. Static routing should be configured on the routers. Ensure that the devices are configured according to the topology. The bridge devices should be configured as follows: Device Name BPod1 BPod2 Label BR1 BR2 SSID BR1 BR1 Address 192.168.1.3/24 192.168.1.4/24
255.255.255.0 255.255.255.0 192.168.1.1 BR1 Root Bridge 192.168.1.2 BR1 Non-Root Bridge
231 - 430
a. Configure the PCs: PC1 with an IP address of 10.0.1.10/24. PC2 with an IP address of 10.0.2.10/24 b. Reconnect using the browser. Enter 10.0.P.1 and connect. c. Verify the settings. 1. What other routing method can be used instead of EIGRP? _________________________________________________________________________ _________________________________________________________________________ 2. Can static routes be used? If so, what is the advantage/disadvantage? _________________________________________________________________________ _________________________________________________________________________
232 - 430
233 - 430
Objective
This lab will introduce the user to the Cisco Aironet AP antenna configuration.
Scenario
An antenna is used to radiate transmitted signals and/or capture received signals. Different antenna components have different ranges and capability in the area of signal they radiate. Placement of the antenna can have different effects on the range or the ability of the AP to transmit and receive the radio wave signals. Cisco antennas use a Reverse Polarity Threaded Navy Connector (RP-TNC). This connector looks like a TNC, but the center contacts have been reversed. This prohibits a standard off-the-shelf antenna from being attached to a Cisco RF product. The U.S Federal Communication Commission (FCC) requires vendors to use non-standard connectors to prevent accidental connections to wireless equipment.
Preparation
Prior to the lab, the student should have a Cisco Aironet AP configured as a root unit and performing properly. The student will also need a laptop computer with a Cisco Aironet client adapter and the utilities installed and performing properly. The students will perform some online Internet research and will require a computer with Internet access.
234 - 430
a. In order to set up the Cisco Aironet antenna, complete the following steps: b. Note the image of the Aironet AP1200 series AP. c. Note the Dual RP-TNC connectors on the AP. The right antenna coupling is the coupling on the right when looking at the AP back panel. 1. What does RP-TNC stand for? RP-TNC stands for Reverse Polarity Threaded Naval Connector 2. What is Vertical Polarization? Polarization is the physical orientation of the element on the antenna that actually emits the RF energy. The antenna is vertically polarized when the antenna is mounted with a vertical orientation. 3. Define antenna beam width. Beamwidth is a measurement used to describe directional antennas. Beamwidth is sometimes called half-power beamwidth. It is the total width in degrees of the main radiation lobe, at the angle where the radiated power has fallen below that on the centerline of the lobe, by 3 dB (half-power). 4. Define antenna bandwidth. The bandwidth of an antenna is the band of frequencies over which it is considered to perform acceptably.
235 - 430
a. Note the image of the Aironet AP1200 Access Point with the standard dipole antennas. b. The orientation of the antenna will be important if the standard dipole antennas are not used. When in diversity mode, the AP uses either the left or right antenna, but not both. Which antena it uses depends on the signal strength. When an optional antenna is used, the antenna receive and transmit setting will have to be changed to one side, which is either the left or right. c. The Cisco part number for the pictured antenna is CISCO AIR-ANT4941. Do some online research and obtain the following information on this part: http://www.cisco.com/en/US/products/hw/wireless/ps469/prod_installation_guide09186a008 0161677.html An additional reference can be found at the following link: http://www.cisco.com/univercd/cc/td/doc/product/wireless/acessory/4941.pdf
236 - 430
Objective
The student will test the effects of various antenna diversity settings on the Cisco Aironet AP. The student will configure the AP radio antennas through GUI and IOS command line.
Scenario
APs have two RP-TNC connectors. These two antennas connectors are for diversity in signal reception, and their purpose is not to increase coverage. They help eliminate the null path and RF being received out of phase. Only one antenna at a time is active. Which antenna is active is selected on a per-client basis for optimal signal and only applies to that specific client. The AP can hop back and forth between antennas when talking to different clients. PCMCIA cards also have antenna diversity built into the card.
Topology
Preparation
Cisco Aironet AP configured as a root unit and performing properly. PCs with a properly installed Cisco Aironet client adapter and ACU utility.
237 - 430
Command List:
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command configure terminal interface dot11radio 0 antenna Description enter global configuration mode enter the device radio interface set the receive or transmit antenna
a. Open a web browser and type the IP address of the AP in the browser address box. b. Go to the Radio0-802.11B Settings page of the AP. c. Record the following information: 1. Enable Radio Setting: Answers will vary. Example: Enable 2. Role in Radio Network Answers will vary. Example: Access Point Root 3. Default Radio Channel Answers will vary. Example: Least congested channel Channel 11
238 - 430
239 - 430
If you are using two standard dipole antennas, very little changes will be effected on the Site Survey Meter. If you remove one of the antennas, you will observe a more dramatic effect in the setting changes. Make numerous changes with the antenna settings and check the results with the PC Aironet Client Site Survey utility. Remember to only make one change at a time so that you have a good idea which setting change caused the effect. d. Which antenna setting gave the strongest signal quality (Left, Right, or Diversity)? Answers will vary. Example: Left e. Which antenna setting gave the strongest signal strength (Left, Right, or Diversity)? Answers will vary. Example: Left f. Which setting gave the weakest signal strength (Left, Right, or Diversity)? Answers will vary. Example: Right
240 - 430 Fundamentals of Wireless LANs v 1.2 Lab 7.1.8.1 Copyright 2003, Cisco Systems, Inc.
g. Which setting gave the weakest signal quality (Left, Right, or Diversity)? Answers will vary. Example: Right
Command List:
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command configure terminal interface dot11radio 0 antenna Description enter global configuration mode enter the device radio interface set the receive or transmit antenna
Follow these steps to set the AP receive and transmit to right: PodP(config)#interface dot11radio 0 PodP(config-if)#antenna receive right PodP(config-if)#antenna transmit right PodP(config-if)# Follow these steps to set the AP receive and transmit to left: PodP(config)#interface dot11radio 0 PodP(config-if)#antenna receive left PodP(config-if)#antenna transmit left PodP(config-if)# Follow these steps to set the AP receive and transmit to diversity: PodP(config)#interface dot11radio 0 PodP(config-if)#antenna receive diversity PodP(config-if)#antenna transmit diversity PodP(config-if)#
241 - 430
Objective
The student will test the effects of various antenna diversity settings on the Cisco BR350
Scenario
Bridges have two RP-TNC connectors attached them. These two antennas connectors are for diversity in signal reception, and their purpose is not to increase coverage or distance. They help eliminate the null path and RF being received out of phase. Only one antenna at a time is active. Which antenna is active is selected on a per-client basis for optimal signal and only applies to that specific client. The bridge can hop back and forth between antennas when talking to different clients. This can be useful in a point to multipoint installation.
Topology
242 - 430
Preparation
Cisco BR350 configured as a root unit and performing properly. Computers with a properly installed Cisco Aironet client adapter and utility.
For this lab, keep this setting on NO. Both antenna settings should be set to diversity at this time.
Located near the bottom of the Radio Hardware page, you will see two Pull down selection menu boxes, one for the Receive Antenna and one for the Transmit Antenna.
244 - 430
Before making any changes to the antenna settings, open the Site Survey utility on the PC. Note the Signal Quality and Signal Strength before any changes are made.
245 - 430
Change the Receive and Transmit antenna settings to left, right, diversity or various combinations and note any changes on the Site Survey Meter once you have applied the changes. d. Is it actually necessary for you to physically remove the antennas? No
If using only one antenna, the Receive and Transmit antenna settings will have to correspond to the proper bridge antenna setting for RF reception.
246 - 430
If using two standard dipole antennas, very little changes will be effected on the Site Survey Meter. If you remove one of the antennas, you will observe a more dramatic effect in the setting changes. Make numerous changes with the antenna settings and check the results with the PC Aironet Client Site Survey utility. Remember to only make one change at a time so that you have a good idea which setting change caused the effect. e. Which antenna setting gave the strongest signal quality (Left, Right, or Diversity)? Answers will vary. Example: Left f. Which antenna setting gave the strongest signal strength (Left, Right, or Diversity)? Answers will vary. Example: Left g. Which setting gave the weakest signal strength (Left, Right, or Diversity)? Answers will vary. Example: Right h. Which setting gave the weakest signal quality (Left, Right, or Diversity)? Answers will vary. Example: Right
247 - 430
Objective
The student will test the effects of various antenna diversity settings on the Cisco BR1310
Scenario
Bridges have two RP-TNC connectors attached them. These two antennas connectors are for diversity in signal reception, and their purpose is not to increase coverage or distance. They help eliminate the null path and RF being received out of phase. Only one antenna at a time is active. Which antenna is active is selected on a per-client basis for optimal signal and only applies to that specific client. The bridge can hop back and forth between antennas when talking to different clients. This can be useful in a point to multipoint installation.
Topology
Preparation
Cisco BR1310 configured as a root unit and performing properly. Computers with a properly installed Cisco Aironet client adapter and utility.
248 - 430
c.
Scroll down to the Receive and Transmit Antenna section. Both the Receive and Transmit Antennas should be set to Diversity by default.
d. Before making any changes to the antenna settings, open the Aironet Desktop Utility on the PC. From the Current Status tab, click the Advanced button and note the Signal Quality and Signal Strength before any changes are made. The quality and strength will be updated continuously if the Advanced Status window is left open.
e. Change the Receive and Transmit antenna settings to left, right, diversity or various combinations and note any changes in the Signal Strength or Signal Quality once you have applied the changes. 1. Is it actually necessary for you to physically remove the antennas?
__________________________________________________________________________
249 - 430 Fundamentals of Wireless LANs v 1.2 Lab 7.1.8.3 Copyright 2003, Cisco Systems, Inc.
If using only one antenna, the Receive and Transmit antenna settings will have to correspond to the proper bridge antenna setting for RF reception. If using two standard dipole antennas, very little changes will be effected on the Site Survey Meter. If you remove one of the antennas, you will observe a more dramatic effect in the setting changes. Make numerous changes with the antenna settings and check the results with the PC Aironet Client Site Survey utility. Remember to only make one change at a time so that you have a good idea which setting change caused the effect. 1. Which antenna setting gave the strongest signal quality (Left, Right, or Diversity)?
__________________________________________________________________________
2. Which antenna setting gave the strongest signal strength (Left, Right, or Diversity)?
__________________________________________________________________________
3. Which setting gave the weakest signal strength (Left, Right, or Diversity)?
__________________________________________________________________________
4. Which setting gave the weakest signal quality (Left, Right, or Diversity)?
__________________________________________________________________________
250 - 430
Objective
Test the range capabilities of the Cisco Aironet AP with an omni-directional antenna configuration.
Scenario
Omni-directional antennas create more coverage area away from the antenna in all directions, but the energy level directly below the antenna will become lower. Omni-directional antennas are generally used for point-to-multipoint implementations.
Topology
Preparation
Prior to the lab, configure a Cisco Aironet AP as a root unit and ensure it is performing properly. Obtain a laptop computer with a Cisco Aironet client adapter and the utilities installed.
a. In order to set up the Cisco Aironet omni-directional antenna, complete the following steps: b. The AP should be turned on and configured. c. Open a Web browser and type in the AP IP address in the browser address box. This should bring up the AP Summary Status or home page.
d. Check the Receive and Transmit mode of the antennas. Since two standard dipole antennas are being used on the AP, the Receive and Transmit antenna modes should be set to Diversity. This allows the AP to use the left or right antenna, depending on which is receiving the stronger signal.
e. Double click on the Link Status Meter (LSM) icon on the laptop and note the signal quality and signal strength meter. f. Move the laptop computer around the room and possibly the building to note any changes in the Link Status Meter. This will give an indication of the coverage area afforded this particular antenna configuration.
g. This lab is using an omni-directional antenna and should generate a radio signal uniformly in all directions. h. Approximately how far is the indoor range of the AP (Meters or Feet)? Answers will vary depending on the data rate set. Example: 100 to 300 feet i. Experiment with changing the data rate on the AP. Were you able to extend your coverage range? Answers will vary. Example: Yes
In order to set up the Cisco Aironet 5GHz Omni directional antenna, complete the following steps: a. Flip up the patch antenna perpendicular to the Aironet AP1200. b. The patch now operates in omni directional mode. The antenna is also dual diversity.
Objective
In this lab, students will test the range capabilities of the Cisco Aironet AP with a directional antenna configuration.
Scenario
Directional antennas will create a coverage area in a particular area caused by the condensed energy of the signal being pushed in a certain direction. Very little energy is in the backside of a directional antenna.
Topology
Preparation
Prior to the lab, the student should have a Cisco Aironet 1200 AP configured as a root unit and performing properly. A laptop computer is also needed with a Cisco Aironet 802.11a and a 802.11b client adapter and the utilities installed and performing properly.
255 - 430
In order to set up the Cisco Aironet directional antenna, complete the following steps: a. For Lab purposes, orient the Patch antenna by placing the antenna in the closed position, which is its directional polarization. The antenna should be pointing toward the area of coverage. b. The AP can be turned on and configured. c. Open a Web browser and type in the AP IP address in the browser address box. d. Check the Receive and Transmit mode of the antenna on the AP Radio0-802.11A page. e. When using the built in Patch antenna on the AP, the Receive and Transmit antenna modes should be set to Diversity. This allows the AP to use the both antennas for transmitting and receiving. Apply these settings.
256 - 430
f.
On the PC, Double click on the Link Status Meter (LSM) icon on the laptop and note the Signal Quality and Signal Strength meter.
g. Move the laptop computer around the room and possibly the building to note any changes in the Link Status Meter. This will give an indication of the coverage area which is given to this particular antenna configuration. h. Sketch the shape of the coverage of the antenna used. Show the AP and the PC client at their farthest distance. i. j. What is the signal quality? Answers will vary. Example: 67% What is the signal strength? Answers will vary. Example: 15%
257 - 430
In order to set up the Cisco Aironet directional antenna, complete the following steps: a. Turn the power off on the AP and unscrew both standard dipole antennas from the rear of the AP. Then install the Yagi Mast Mount antenna to the AP by screwing the antenna TNC connector to the AP right TNC connector.
b. For Lab purposes, orient the Yagi Mast Mount antenna by placing the antenna in a horizontal position, which is its polarization. The antenna should be pointing toward the area of coverage. Positioning of the Yagi Mast Mount is very important and affects the coverage area. c. The AP can be turned on and configured. d. Open a Web browser and type in the AP IP address in the browser address box. e. Check the Receive and Transmit mode of the antenna on the AP Radio0-802.11 page.
258 - 430
f.
When using a single Yagi Mast Mount antenna on the AP, the Receive and Transmit antenna modes should be set to right. This allows the AP to use the right antenna for transmitting and receiving. Apply these settings.
g. Double click on the Link Status Meter (LSM) icon on the laptop and note the Signal Quality and Signal Strength meter. h. Move the laptop computer around the room and possibly the building to note any changes in the Link Status Meter. This will give an indication of the coverage area which is given to this particular antenna configuration. i. j. k. Sketch the shape of the coverage of the antenna used. Show the AP and the PC client at their farthest distance. What is the signal quality? Answers will vary. Example: 91% What is the signal strength? Answers will vary. Example: 41%
259 - 430
Objective
In this lab, students will gain an understanding of the primary attack methods used to bypass conventional security measures on WLANs. Additionally, students will learn the countermeasures that can be implemented for security on a WLAN.
Scenario
Network security is the process by which digital information assets are protected. The goals of security are to maintain integrity, protect confidentiality, and assure availability. This lab will focus on understanding wireless security concepts.
Preparation
The students will require access to the Internet for online research.
b. Which of the weaknesses refers to a lack of a written security policy? Policy weakness c. Which of the weaknesses refers to unsecured default settings? Configuration weakness d. Which of the weaknesses refers to weak initialization vector, poor encryption and authentication schemes, and firewall holes? Technology weakness
b. Which of the attacks is occurring when the attacker now controls one system and can either deface the public Web presence or continue hacking for more interesting information? Access attack c. How is this attack performed? What tools are available? Entering or accessing systems to which one does not have authorized access usually involves running a hack script or tool that exploits a known vulnerability of the system or application being attacked. An example of a hacking tool is LophtCrack, this is a cracking tool that can be used to crack passwords to gain unauthorized access to a system. d. Which of the attacks is occurring when the attack results in obtaining address ranges, hosts, and services? In this case, the known servers and the firewall may or may not be detected. Reconnaissance attack, WarDriving e. How is this attack performed? What tools are available? Performing reconnaissance involves the use of common commands or utilities to learn as much as possible about the victim site. Commercial wireless protocol analyzers like AiroPeek, AirMagnet, or Sniffer Wireless can be used to eavesdrop on WLANs. Wireless snooping and packet sniffing are common terms for eavesdropping. Other freeware programs such as kismet and airsnort are used. Programs such as NMAP and Ntop are used to scan for open ports and vulnerabilities.
261 - 430
f.
Which of the attacks is occurring when the attacker has disabled valid users from accessing the target network causing lost revenue, lost communications, and damaged software and hardware? Denial of Service (DoS) Attack
g. How is this attack performed? What tools are available? DoS attacks take many forms. In most cases, performing the attack simply involves running a hack, script, or tool. DoS are when an attacker disables or corrupts wireless networks, systems, or services, with the intent of denying the service to authorized users.
b. Name the one that serves to logically segment the users and APs that form part of a wireless subsystem. Service Set Identifier (SSID) c. Name the other that replaces the original data payload with the output of the encryption algorithm. Wired Equivalent Privacy (WEP) d. What are the two types of authentication methods defined in IEEE 802.11? Open Authentication and Shared Key Authentication
262 - 430 Fundamentals of Wireless LANs v 1.2 Lab 8.2.4 Copyright 2003, Cisco Systems, Inc.
e. What are the three elements of the association process? Probe Authentication Association
263 - 430
Objective
In this lab, the student will learn the following objectives: Password protect the console Define administrator accounts Configure accurate time and check firmware Configure SSH Disable telnet and web (optional)
Scenario
Students will learn to secure the AP through GUI. The security policy of the company mandates all devices should be locked down according to minimum standards. Also, SSH must be used for remote management. SSH is a program, similar to Telnet, which allows a network administrator to log into another computer over a network. SSH allows an administrator to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure networks. There are currently two versions of SSH available: SSH Version 1 and SSH Version 2. Only SSH Version 1 is implemented in the Cisco IOS software.
Topology
264 - 430
Preparation
Team 1 2 AP Name Pod1 Pod2 SSID AP1 AP2 Address 10.0.1.1/24 10.0.2.1/24
The instructor should have a working wired network. PC1 should be connected to the wired network. Prior to starting the lab, ensure that each host PC is loaded with a SSH client. There are numerous SSH clients available for free on the Internet. The lab was developed using the PuTTY SSH client.
Additional Materials:
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_installation_and_configuration_gu ide_book09186a0080147d69.html http://www.chiark.greenend.org.uk/~sgtatham/putty/
a. If there is an existing configuration on the AP, erase the configuration and reload either through GUI or IOS CLI. b. Configure the hostname, SSID, and BVI interface according to the Preparation table.
265 - 430
One of the easiest ways for hackers to gain access to network devices is by using default usernames and passwords. a. Configure a new administrator account from the SECURITY>Admin Access page. Give this user Read-Write privileges. Username: cIsCo123 Password: cIsCo123 b. In a production environment, it is necessary to delete the old account. However, in the lab, do not remove the existing account. Also, it is important to encrypt the passwords in the configurations if there are multiple administrator accounts with various privilege levels. By default, this is enabled on the AP 1200. Notice the password is bulleted out. c. Enable only Local User List Only and click Apply. At this point, the AP will require authentication with the new Username.
266 - 430
In order to keep track on any potential attacks, it is important to maintain proper time. a. From the SERVICES>NTP page manually set the correct time and date. Click Apply to save the changes.
267 - 430
c.
d. Does this AP have any known vulnerabilities? Possibly, but none are known or posted at this time
a. From the SERVICES>Telnet/SSH page enable Secure Shell. b. Enter the System name of PodP (where P is the pod number). c. Enter a domain name of fwl.com. d. Enter a key size (optional). e. Keep the default Timeout and Retries values. f. Click Apply. g. What is the default size, in bits, of the key modulus? 512 h. Press OK to accept the default key size and continue.
Note In a production environment, after enabling SSH, telnet and http should be disabled.
268 - 430
b. In the Host Name (or IP address) input box, enter the IP address of the pod AP. Next, change the protocol to SSH. These two values must be sent to establish the SSH. To test the connection, press the Open command button at the bottom of the window. c. The SSH Client will popup a Security Alert window. Click Yes to trust the host.
d. The SSH client will prompt for the local username and password that was previously set on the Pod AP. Enter the cIsCo123 for the username and cIsCo123 for the password.
269 - 430
e. Was the SSH connection successful? If so, how is the prompt displayed? Should be YES. The prompt should be PodP#, where P is the pod number.
270 - 430
b. Fill in the appropriate values in the table below based on the active Secure Shell Server Connections. Connection 1 Version 1.5 Encryption 3DES State Session Started Username cisCo123
c.
271 - 430
Objective
In this lab, the student will learn the following objectives: Password protect the console Define administrator accounts Configure accurate time and check firmware Configure SSH o o Limit VTY to SSH Access-list to secure SSH
Scenario
Students will learn to secure the AP through Cisco Internetworking Operating System (IOS). The security policy of the company mandates all devices should be locked down according to minimum standards. Also, SSH must be used for remote management. SSH is a program, similar to Telnet, which allows a network administrator to log into another computer over a network. SSH allows an administrator to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure networks. There are currently two versions of SSH available, SSH Version 1 and SSH Version 2. Only SSH Version 1 is implemented in the Cisco IOS software.
272 - 430
Topology
Preparation
Team 1 2 AP Name Pod1 Pod2 SSID AP1 AP2 Address 10.0.1.1/24 10.0.2.1/24
The instructor should have a working wired network. PC1 should be connected to the wired network. Prior to starting the lab, ensure that each host PC is loaded with a SSH client. There are numerous SSH clients available for free on the Internet. The lab was developed using the PuTTY SSH client.
Additional Materials
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_installation_and_configuration_gu ide_book09186a0080147d69.html http://www.chiark.greenend.org.uk/~sgtatham/putty/
273 - 430
Command List
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command
crypto key generate rsa hostname ip domain-name ip ssh transport input
Description
Generates Rivest, Shamir, and Adleman (RSA) key pairs. This command changes the APs hostname. Defines a default domain name that the Cisco IOS software uses to complete unqualified host names. Use the ip ssh command to configure Secure Shell (SSH) control parameters on the AP. Defines which protocols to use to connect to a specific line of the AP.
g. Remain on PC1 to configure the following steps. h. While in configuration mode, check the configuration PodP(config)#do show run
274 - 430
c.
Also, it is important to encrypt the passwords in the configurations if there are multiple administrator accounts with various privilege levels. By default, this is enabled on the AP 1200. PodP(config)#service password-encryption
d. While in configuration mode, verify the user accounts and password encryption. PodP(config)#do show run e. Secure the console connection by requiring a password. PodP(config)#line con 0 PodP(config-line)#login PodP(config-line)#password cIsCo123 f. Exit out of the AP and log back in. User Access Verification Password: g. A more secure method is to require a username and password combination. Return to configuration mode and configure local authentication on the console. PodP(config)#line con 0 PodP(config-line)#login local h. Exit out of the AP and log back in using the username password combination configured in step 2a. User Access Verification Username: Password: PodP>
275 - 430
c.
(Optional) Configure daylight savings time. Use the help feature or command reference if needed. PodP(config)#clock summer-time
d. Check the clock settings while in configuration mode. PodP(config)#do show clock
d. Does this AP have any known vulnerabilities? Possibly, but none are known or posted at this time.
Generate RSA keys (continued) To enable SSH for local and remote authentication on the AP, enter the command crypto key generate rsa and press Enter. The AP will respond with a message showing the naming convention for the keys. c. What is the default size, in bits, of the key modulus? 512 d. Press Enter to accept the default key size and continue.
277 - 430
278 - 430
b. In the Host Name (or IP address) input box enter the IP address of the pod AP. Next, change the protocol to SSH. These two values must be sent to establish the SSH. To test the connection, press the Open command button at the bottom of the window. c. The SSH client will prompt for the local username and password that was previously set on the Pod AP. Enter the cIsCo123 for the username and cIsCo123 for the password.
d. Was the SSH connection successful? If so, how is the prompt displayed? Should be successful, and the prompt should look like the password of [email protected]
PodP(config)#exit PodP#terminal monitor PodP#debug ip ssh b. SSH debug output c. Next, open another instance of the SSH client and connect to the AP. Use the correct username and password to log in to the AP. The debug output should be similar to the output below. 03:45:37: SSH1: starting SSH control process 03:45:37: SSH1: sent protocol version id SSH-1.5-Cisco-1.25 03:45:37: SSH1: protocol version id is - SSH-1.5-PuTTY-Release-0.53b 03:45:37: SSH1: SSH_SMSG_PUBLIC_KEY msg 03:45:38: SSH1: SSH_CMSG_SESSION_KEY msg - length 112, type 0x03 03:45:38: SSH: RSA decrypt started 03:45:39: SSH: RSA decrypt finished 03:45:39: SSH: RSA decrypt started 03:45:39: SSH: RSA decrypt finished 03:45:39: SSH1: sending encryption confirmation 03:45:39: SSH1: keys exchanged and encryption on 03:45:41: SSH1: SSH_CMSG_USER message received 03:45:41: SSH1: authentication request for userid cisco 03:45:41: SSH1: SSH_SMSG_FAILURE message sent 03:45:44: SSH1: SSH_CMSG_AUTH_PASSWORD message received 03:45:44: SSH1: authentication successful for cisco 03:45:44: SSH1: requesting TTY 03:45:44: SSH1: setting TTY - requested: length 24, width 80; set: length 24, width 80 03:45:44: SSH1: SSH_CMSG_EXEC_SHELL message received 03:45:44: SSH1: starting shell for vty03:45:37: SSH1: starting SSH control process d. To get an idea of the debugging process and the debugging message, open another instance of the SSH client and intentionally enter the wrong username or password. View the debugging output for failed authentication. Disable debugging PodP#undebug all All possible debugging has been turned off e. Viewing SSH sessions f. Use the show ssh command to view the active SSH sessions.
g. Fill in the appropriate values of the table below, based on the output of the show ssh command. Connection 1 Viewing SSH parameters h. To display the version information and SSH parameters, use the show ip ssh command. i. Is the output displayed exactly as the output below? If not, what are the differences? Answers may vary. Example: Yes
280 - 430 Fundamentals of Wireless LANs v 1.2 Lab 8.3.1.2 Copyright 2003, Cisco Systems, Inc.
Version 1.5
Encryption 3DES
Username cisCo123
PodP>sh ip ssh SSH Enabled - version 1.5 Authentication timeout: 15 secs; Authentication retries: 3
d. Was the Telnet connection successful? Why or why not? Should fail. Because only the SSH session is allowed. Enter SSH parameters. e. Enter the following commands to establish a SSH connection to the peer AP: PodP#ssh ? f. What are the additional arguments of the ssh command? -c -l -o -p WORD Select encryption algorithm Log in using this user name Specify options Connect to this port IP address or hostname of a remote system
g. What encryption algorithms are available? PodP#ssh -c ? 3des triple des des des Establish AP to AP SSH connection. h. Enter the following command to establish a SSH connection to the peer AP: PodP>ssh c des l cisco 10.0.Q.1 (where Q is the peer team AP)
This command makes a SSH connection to a peer AP with an address of 10.0.Q.2, DES as the encryption, and cisco as the login username. i. Was the SSH connection successful? Should be successful. If not, ping from the PC to the AP. If the ping is successful, turn on debugging and try the connection again. Verify SSH. j. Enter the following command to verify the SSH connection:
281 - 430
PodP#show ip ssh PodP#show ssh k. What other commands could be useful to verify and troubleshoot SSH connections? Answers will vary Example: debug ssh, debug ip ssh
282 - 430
Objective
In this lab, the student will learn how to set and enable a protocol filter on the AP and how to set and enable MAC address filters on the AP.
Scenario
Protocol filters prevent or allow the use of specific protocols through the AP. Individual protocol filters or sets of filters can be set up for either the Radio or Ethernet ports. Protocols can be filtered for wireless client devices, users on the wired LAN, or both. MAC address filters allow or disallow the forwarding of unicast and multicast packets either sent from or addressed to specific MAC addresses. A filter can be created that passes traffic to all MAC addresses except those that are specified. A filter can also be created that blocks traffic to all MAC addresses except those that are specified.
Topology
283 - 430
Preparation
Team 1 2 AP Name Pod1 Pod2 SSID AP1 AP2 Address 10.0.1.1/24 10.0.2.1/24
The APs and PC client adapter and utility should be installed and properly configured prior to the lab. The students will also familiarize themselves with the various EtherType, IP, and port filters available on the AP.
284 - 430
d. Make sure <NEW> (the default) is selected in the Create/Edit Filter Index menu. e. In the Filter Index field, name the filter with a number from 701. f. Enter a MAC address wireless PC2 in the Add MAC Address field. Enter the address with periods separating the three groups of four characters (0007.50CA.E208, for example).
g. Select Forward from the Action menu. h. Click Add. The MAC address appears in the Filters Classes field. i. Click Apply. The filter is saved on the AP, but it is not enabled until it is applied on the Apply Filters page.
285 - 430
a. From the SERVICES>Filters Page, go to the APPLY FILTERS tab. b. Select the filter number 701 from the Radio0-802.11B MAC drop-down menus. Apply the filter to incoming and outgoing packets. c. Click Apply. The filter is enabled on the selected ports.
Client devices with blocked MAC addresses cannot send or receive data through the AP, but they might remain in the Association Table as unauthenticated client devices. Client devices with blocked MAC addresses disappear from the Association Table when the AP stops monitoring them, when the AP reboots, or when the clients associate with another AP.
Note
286 - 430
a. From the SERVICES>Filters Page change the 701 to <NONE> on both Incoming and Outgoing. b. Click Apply. c. From PC 2 and PC 3, ping the AP at 10.0.P.1. Should be. Yes d. Was this successful? Should it be successful?
287 - 430
d. Make sure <NEW> (the default) is selected in the Create/Edit Filter Index menu, and then click the Add button. e. Enter a descriptive name of MYFILTER for the new filter in the Filter Name field. f. Select Block all as the filter's default action from the Default Action menu. g. Configure the Destination Address: of 0.0.0.0 and a Mask: of 255.255.255.255. h. Add 10.0.P.12 as the Source Address: with a Mask: of 0.0.0.0 to permit PC2 traffic. i. j. k. . Make sure Forward is selected for the Action: Click the Add button. The ACL will now appear in the Filters Classes Box at the bottom of the Filters page. Verify the configuration in the Filters Classes box.
l.
288 - 430
a. Select MYFILTER from the radio ports incoming and outgoing IP fields. b. Click Apply. The filter is now enabled on the selected interface(s).
289 - 430
Objective
In this lab, students will demonstrate an understanding of the role of a Wired Equivalent Privacy (WEP) key in network security. Additionally, students will learn how to enable WEP on an AP and on the client PC.
Scenario
The purpose of WEP is to protect the privacy of transmitted data. WEP keys are used to encrypt the data signals the AP transmits and to decrypt the data signals the AP receives (and includes data transmitted and received by the client).
Topology
Preparation
The students will read and understand FWL Chapter 8 prior to the lab. All APs and PCs will be properly setup according to the topology prior to the lab. Ensure an existing wireless connection is present from PC2 to the AP.
290 - 430
In order to configure WEP on the AP, complete the following steps: a. Verify connectivity from the wireless client (PC2) to the AP b. Open a Web browser on the PC1 and type the IP address of the AP to configure in the browser address bar. c. Go to the Security Setup page of the AP and click on the Encryption Manager option.
291 - 430
WEP keys can be entered in ASCII or hexadecimal on most equipment. Cisco Aironet equipment requires WEP keys to be entered in hexadecimal. 40-bit WEP keys are 10 hexadecimal characters long. 128-bit WEP keys are 26 hexadecimal characters long. To configure WEP, follow the steps below: a. Check the radio button WEP Encryption Mode for WEP Encryption b. Use the Pull Down Menu to select Mandatory c. Select the Transmit Key d. Enter the Encryption key (for lab purposes will be) 12345678909876543210123456 e. Select the Key size 128 bits f. Click the Apply-All button to apply these options. g. Once WEP is configured on the AP with a Mandatory option, all the clients will become disassociated to this AP.
292 - 430
View the SECURITY>Encryption Manager page. The WEP settings should be configured and the Encryption Key field should be stored in the AP. However, the Key field should be encrypted with asterisk symbols to prevent unauthorized users from viewing the Encryption Key. 1. What Encryption option allows client devices that can communicate with the AP either with or without WEP? WEP Encryption Optional
293 - 430
In order to configure the WEP settings on the wireless client adapter, complete the following steps: a. Open the Aironet client utility by clicking on the ACU icon. b. Click Profile Manager to edit the WEP settings. c. Under the Profile Management section, choose the profile being used for this lab, and click Edit. d. Go to the Network Security tab of the profile that is being used for the lab. e. Configure the following settings for WEP: 1. Select the WEP setting Use Static WEP keys 2. Select the Static WEP key entry method Hexadecimal 3. Select the AP Authentication Open authentication 4. Select and enter the Transmit key [for lab purposes will be] 12345678909876543210123456 5. Select the WEP key Size 128 bits 6. Click the OK button to apply the WEP settings to the client 7. The client should re-associate to the AP once WEP is enabled properly on the AP and the client adapter utility.
294 - 430
f.
How many WEP keys can be stored on the Cisco client adapter? four
g. What happens if a device receives a packet that is not encrypted with the appropriate key? It is dropped. h. What is the more secure authentication method, shared key or open? Open Authentication is considered the more secure method
295 - 430
Objective
The student will extend the coverage of a basic service set topology by implementing an AP as a repeater using WEP.
Scenario
An AP can be configured as a repeater to extend the wireless infrastructure range or to overcome an obstacle that blocks radio communication. The repeater forwards traffic between wireless users and the wired LAN by sending packets to another repeater or to an AP connected to the wired LAN. The data is sent through the route that provides the best performance for the client. In this lab, the Root AP will be Pod1. The repeater AP will be Pod2. WEP must now be enabled per the security policy.
Topology
296 - 430
Preparation
Team 1 2 Access Point Name Pod1 (root) Pod2 (repeater) SSID AP1 AP1 Address 10.0.1.1/24 10.0.1.2/24
The instructor should have a working wired network. PC1 should be connected to the wired network.
Additional Materials
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_installation_and_configuration_gu ide_book09186a0080147d69.html
297 - 430
Pod2(config-if-ssid)# e. Exit SSID configuration mode and return to radio interface configuration mode. Pod2(config-if-ssid)#exit Pod2(config-if)# f. Set the role of the AP in the wireless LAN to repeater. Pod2(config-if)#station-role repeater g. If Aironet extensions are disabled, enable Aironet extensions. Pod2(config-if)#dot11 extension aironet h. MAC addresses can be entered for up to four parent APs. The repeater attempts to associate to MAC address 1 first; if that AP does not respond, the repeater tries the next AP in its parent list. (Optional) Enter the MAC address for the AP to which the repeater should associate. Pod2(config-if)#parent 1 0987.1234.e345 (This should be the MAC address of Pod1 11.b radio.) i. Verify the configuration Pod2#show run interface Dot11Radio0 no ip address no ip route-cache ! ssid AP1 authentication open infrastructure-ssid ! parent 1 0987.1234.e345 speed basic-1.0 basic-2.0 basic-5.5 basic-11.0 rts threshold 2312 station-role repeater
The repeater AP should also appear as associated with the root AP in the Association Table of the root AP. On Pod1, verify that Pod2 is connected. There may also be other wireless clients associated. a. Check the detailed status of all clients Pod1#show dot11 associations all-clients
298 - 430
b. Create a WEP key and set up its properties. PodP(config-if)#encryption key 1 size 128 12345678901234567890123456 transmit-key
299 - 430
Objective
In this lab, the student will learn about the second generation of Wireless LAN security and how to implement LEAP on a Wireless LAN for secure client authentication. The main steps to this lab are: 1. Configure AP WEP Key or Cipher 2. Configure RADIUS Server 3. Configure Local RADIUS Server 4. Configure Users 5. Configure and verify LEAP/EAP Authentication on the AP 6. Configure LEAP/EAP on the client (PC2) through ACU 7. Monitor the connection, login, and authentication statistics
Topology
300 - 430
Scenario
One way to secure wireless LANs and improve network security is to use authentication for accessing the AP. Wireless clients can use Extensible Authentication Protocol (EAP) to authenticate to a wireless LAN. 802.1x local RADIUS authentication is available on the 1100 and 1200 APs. This allows LEAP/EAP to be used without requiring a Cisco Secure ACS Server. Furthermore, this feature provides a backup for ACS Servers in an Enterprise network.
Preparation
Prior to this lab, the Cisco Aironet AP should be configured to allow clients to associate. The IP address, hostname and SSID should be configured on the AP. A PC should be installed with a Cisco Aironet Client Card, and it should already be associated to the AP. Cable the equipment according to the Topology. Update the Aironet Client Utility version 6.0 or later.
In order to enable Cisco LEAP on the AP, WEP Encryption or a Cipher must be enabled. a. From the SECURITY>Encryption Manager Page of the AP, configure the Encryption Key 1. b. Click on the WEP Encryption radio button. c. Select Mandatory. d. Click Apply-All.
301 - 430
e. The Cipher option can be used for greater security. What options are available? Answer:
Complete the following steps to configure the Backup RADIUS Server from the SECURITY>Server Manager Page: a. Enter the IP address of the Local RADIUS server in the Server Name/IP entry field. This will be the IP address of the AP where the local RADIUS database is running. Should be 10.0.P.1 b. Enter the Shared Secret key of secretkey c. Click Apply.
Complete the following steps to configure a Local RADIUS Server from the SECURITY>Local RADIUS Server Page: a. Click on the GENERAL SET-UP tab. b. Enter the IP address of the Local RADIUS server in the Server Name/IP entry field. This will be the IP address of the AP where the local RADIUS database is running, 10.0.P.1
302 - 430 Fundamentals of Wireless LANs v 1.2 Lab 8.4.5.1 Copyright 2003, Cisco Systems, Inc.
c.
d. Click Apply.
Complete the following steps to configure users from the SECURITY > Local RADIUS Server Page: a. Continue from the GENERAL SET-UP tab. b. Enter the following users: User 1 2 c. Click Apply. Username aaauser Cisco1 Password aaapass ciscopass
303 - 430
In order to enable Cisco LEAP on the AP, complete the following steps to configure the Authentication Method: a. On the SECURITY>SSID Manager page of the AP, create a new SSID of APP, where P is the Pod number. b. Check the Network EAP box. c. Click the Apply-All button.
304 - 430
From the SECURITY Home page of the AP, verify Network EAP is checked and the only SSID is APP. The default tsunami SSID should be deleted for security. Also verify the Server Based Security is configured correctly as shown.
305 - 430
In order to enable the EAP in the Aironet client utility, complete the following steps: a. On PC2, configure the TCP/IP settings for the Wireless Network Connection if a DHCP server is not available. Otherwise, when the client authenticates, the wireless PC will not be able to communicate through IP. i. ii. iii. IP address of 10.0.P.12 Subnet mask of 255.255.255.0 Gateway of 10.0.P.254
b. Go to the Network Security tab in the Aironet Client Utility on PC2 and each of the wireless client computers. c. Select the LEAP from the Network Security Type: drop down list and click Configure.
306 - 430
d. Click on Use Saved User Name and Password. i. Enter aaauser for the User Name. ii. Enter aaapass for the Password. iii. Enter aaapass for the Confirm Password. iv. Uncheck the two checkboxes at the bottom of the LEAP Settings window. v. Click OK. e. In the profile manager, select the profile which LEAP is configured on and click OK. If a save username and password was not configured, an authentication screen should come up asking for a user ID and password. Type in the following. i. The username for authentication is aaauser. ii. The password for authentication is aaapass. f. The ACM icon should change to green once the authentication is complete. g. From PC1, PC2 or the ACS Server, browse to the AP ASSOCIATION page to verify the connection. h. What are the three authentication states? Associated, Authentication Pending, Authenticated.
307 - 430
From the ASSOCIATION page of the AP, verify the association state. This should display all of the connected clients.
From the EVENT LOG Page of the AP, check the association logs.
From the SECURITY>Local RADIUS Server Page of the AP, click on the STATISTICS tab. Verify the User Information for authentication successes, failures, and blocks.
308 - 430 Fundamentals of Wireless LANs v 1.2 Lab 8.4.5.1 Copyright 2003, Cisco Systems, Inc.
Objective
In this lab, the student will learn about the second generation of Wireless LAN security and how to implement LEAP on a Wireless LAN for secure client authentication. The main steps to this lab are: 8. Install Cisco Secure ACS software (Instructor) 9. Configure the Cisco Secure ACS software 10. Create user accounts in the Access Control Server (ACS) 11. Configure AP WEP Key or Cipher 12. Configure LEAP/EAP on the AP 13. Configure LEAP/EAP on the client (PC2) through ACU 14. Monitor the connection and login
Topology
309 - 430
Scenario
One way to secure wireless LANs and improve network security is to use authentication for accessing the AP. Wireless clients can use Extensible Authentication Protocol (EAP) to authenticate though a wireless LAN. EAP can authenticate through digital certificates such as public key infrastructure (PKI) or passwords and usernames. EAP can pass authentication information onto an Authentication, Authorization, Accounting (AAA) RADIUS server, such as a Cisco Access Control Server (ACS). The Network Authentication Process can be summarized in four main stages: The client adapter uses the username and password to start the authentication process. The AP communicates with the EAP-compliant RADIUS server to authenticate the username and password. If the username and password are valid, the RADIUS server and the client adapter negotiate a dynamic, session-based Wired Equivalent Privacy (WEP) key. The key, which is unique for the authenticated client, provides the client with secure network access. The client and AP use the WEP key for all data transmissions during the session.
Preparation
Prior to this lab, the Cisco Aironet AP should be configured to allow clients to associate. The IP address, hostname and SSID should be configured on the AP. A PC should be installed with a Cisco Aironet Client Card, and it should already be associated to the AP. Cable the equipment according to the Topology. A Windows 2000 Server running ACS 2.6 or above must be available. Update the Aironet Client Utility version 6.0 or later.
An evaluation copy of Cisco Secure ACS can be downloaded from the following link: http://www.cisco.com/cgi-bin/tablebuild.pl/acs-win-3des
310 - 430
Follow these steps to include the AP as a AAA Client in Cisco Secure ACS: a. After properly loading the TACACS software on the Windows Server computer, on the ACS main menu, click Network Configuration. b. Click Add New Access Server, or it may display Add Entry.
311 - 430
a. In the Network Access Server Hostname box, type the system name of the AP. Enter PodP (where P is the Pod number) b. In the Network Access Server IP address box, type the AP IP address. Enter 10.0.P.1 (where P is the Pod number) c. In the Key box, type the shared secret that the AP and Cisco Secure ACS use to encrypt the data. For correct operation, the identical key, which is case sensitive, must be configured on the AP. For simplicity of the lab, use the word secretkey.
d. From the Authenticate Using list box, click the network security protocol. Select RADIUS (Cisco Aironet). e. Each AP in the class will have to be added to this list if it will be using LEAP. f. Remote Access Services must be started on the RADIUS Server for LEAP to work properly. To save the changes and apply them immediately, click the Submit + Restart button.
It is very important to click Submit + Restart
Note
312 - 430
a. Click on the User Setup button located on the left side of the ACS Home page. b. Type the user name aaauser in the User: field box, and then click on the Add/Edit button beneath this box.
313 - 430
c.
Type the user password aaapass in the Password: box and then type aaapass in the Confirm Password: box.
d. Click on the Submit button to add this entry to the user list. e. Additional users can be added to this database list for each wireless PC client.
314 - 430
In order to enable Cisco LEAP on the AP, WEP Encryption or a Cipher must be enabled. a. From the SECURITY>Encryption Manager page of the AP, configure the Encryption Key 1. b. Click on the WEP Encryption radio button. c. Select Mandatory. d. Click Apply-All. e. The Cipher option can be used for greater security. What options are available? Answer:
315 - 430
In order to enable Cisco LEAP on the AP, complete the following steps to configure the Authentication Method: a. On the SECURITY>SSID Manager page of the AP, create a new SSID of APP (where P is the Pod number) b. Check the Network EAP box. c. Check the Enable Accounting box. d. Click the Apply-All button.
316 - 430
In order to enable Cisco LEAP on the AP, complete the following steps to configure a RADIUS Server from the SECURITY>Server Manager Page: a. Enter the IP address of the RADIUS server in the Server Name/IP entry field. This will be the IP address of the Windows Server where the ACS software is running. Should be 10.0.P.11. b. Enter the port number the RADIUS server uses for authentication. This will default to port 1645 if the field is left empty. c. Enter the shared secret used by the RADIUS server in the Shared Secret entry field. This was configured as secretkey on ACS. The shared secret on the AP must match the shared secret on the RADIUS server.
d. Check the EAP Authentication and Accounting box. e. Click the APPLY button.
317 - 430
f.
From the SECURITY Home page of the AP, verify Network EAP is checked and the only SSID. The default tsunami SSID should be deleted for security. Also verify the Server Based Security is configured correctly as shown.
In order to enable the EAP in the Aironet client utility, complete the following steps: a. On PC2, configure the TCP/IP settings for the Wireless Network Connection if a DHCP server is not available. Otherwise, when the client authenticates, the wireless PC will not be able to communicate through IP. i. IP address of 10.0.P.12 ii. Subnet mask of 255.255.255.0 iii. Gateway of 10.0.P.254
b. Go to the Network Security tab in the Aironet Client Utility on PC2 and each of the wireless client computers. c. Select the LEAP from the Network Security Type: drop down list and click Configure.
318 - 430
d. Click on Use Saved User Name and Password i. Enter aaauser for the User Name ii. Enter aaapass for the Password iii. Enter aaapass for the Confirm Password iv. Uncheck the two checkboxes at the bottom of the LEAP Settings window v. Click OK. e. In the profile manager, select the profile which LEAP is configured on and click OK. If a save username and password was not configured, an authentication screen should come up asking for a user ID and password. Type in the following. i. The username for authentication is aaauser. ii. The password for authentication is aaapass. f. From PC1, PC2 or the ACS Server, browse to the AP ASSOCIATION page to verify the connection. Associated, Authentication Pending, Authenticated.
319 - 430
From the ASSOCIATION page of the AP, verify the association state. This should display all of the connected clients.
a. Click on the Reports and Activity button located on the left side of the ACS Home page. b. Next, click on the RADIUS Accounting link.
320 - 430
c.
On the right hand side, select the RADIUS Accounting active.csv link.
d. Fill in the information found in the accounting file below. Answers will vary Example: RADIUS Accounting active.csv UserName GroupName Default Group Default Group Default Group Default Group CallingStation-Id AcctStatusType AcctSessionId 4600035 4600035 4600034 4600034 .. .. .. .. FramedIPAddress NASPort 37 37 37 37 NAS-IPAddress 10.0.1.1 10.0.1.1 10.0.1.1 10.0.1.1
Date
Time
09/14/2003 18:51:30 ppatric 09/14/2003 18:03:47 ppatric 09/14/2003 00:51:09 ppatric 09/14/2003 00:19:40 ppatric
321 - 430
Objective
In this lab, students will demonstrate an understanding of the role of enterprise wireless network security. Additionally, students will configure MIC, TKIP and BKR on an AP.
Scenario
The purpose of WEP is to protect the privacy of transmitted data. However, WEP has inherent security weaknesses. There are many mechanisms available to provide additional security for WEP.
Topology
Preparation
The AP and PCs should be properly setup according to the topology prior to the lab. Ensure an existing wireless connection is present from PC2 to the AP.
322 - 430
CKIP (Cisco Key Integrity Protocol)Cisco's WEP key permutation technique based on an early algorithm presented by the IEEE 802.11i security task group. CMIC (Cisco Message Integrity Check)Like TKIP's Michael, Cisco's message integrity check mechanism is designed to detect forgery attacks. Broadcast key rotationBroadcast Key Rotation allows the AP to generate the best possible random key and update all key-management capable clients periodically.
Cannot configure a WEP key in key slot 4 Cannot configure a 128-bit key Cannot configure a 40-bit key Cannot configure any WEP keys Cannot configure a WEP key in key slot 1 and 4
AP and client devices must use the same WEP key as the transmit key, and the key must be in the same key slot on both AP and clients Keys in slots 2 and 3 are overwritten by rotating broadcast keys
323 - 430
In order to configure WEP on the AP, complete the following steps: a. Verify connectivity from the wireless client (PC2) to the AP. b. Open a Web browser on PC1 and type the IP address of the AP to configure in the browser address bar. c. Go to the Security Setup page of the AP and click on the Encryption Manager option. d. Check the radio button WEP Encryption Mode for WEP Encryption. e. Use the Pull Down Menu to select Mandatory. f. Select the Transmit Key. g. Enter the Encryption key (for lab purposes will be) 12345678909876543210123456. h. Select the Key size 128 bits. i. j. k. Click the Apply-All button to apply these options. Once WEP is configured on the AP with a Mandatory option, all the clients will become disassociated to this AP. View the SECURITY>Encryption Manager page. The WEP settings should be configured and the Encryption Key field should be stored in the AP. However, the Key field should be encrypted with asterisk symbols to prevent unauthorized users from viewing the Encryption Key.
324 - 430
a. Open the Aironet client utility by clicking on the ACU icon. b. Click Profile Manager to edit the WEP settings. c. Under the Profile Management section, choose the profile being used for this lab, and click Edit. d. Go to the Network Security tab of the profile that is being used for the lab. e. Configure the following settings for WEP: i. ii. iii. iv. v. vi. vii. viii. Select the WEP setting Use Static WEP keys Select the Static WEP key entry method Hexadecimal Select the AP Authentication Open authentication Select and enter the Transmit key [for lab purposes will be] 12345678909876543210123456 Select the WEP key Size 128 bits Click the OK button to apply the WEP settings to the client The connection should be reestablished between PC2 and the AP. From the ACU Statistics Page, notice the Packets Aged and Up-Time values on the lower left hand corner.
325 - 430
From the SECURITY>Encryption Manager Page, enable Cisco Compliant TKIP features. a. Check the Enable MIC and Enable Per Packet Keying (PPK). These mechanisms can be used separately or together. b. Click Apply-All
c.
From the NETWORK INTERFACES>Radio0-802.11b Settings tab, verify the Aironet Extensions are enabled.
d. Also, check the 802.11a interface if applicable. e. Verify the connection between PC2 and the AP
326 - 430 Fundamentals of Wireless LANs v 1.2 Lab 8.5.4.1 Copyright 2003, Cisco Systems, Inc.
f.
From the ACU Statistics Page, verify the Packets MIC OK statistics. The MIC statistics should now appear between the Packets Aged and Up-Time values. These values appear when MIC is enabled on the AP.
g. From the SECURITY Page, verify MIC and PPK are enabled. h. What does MIC do to protect WEP? MIC uses a hashing algorithm to stamp the frame. Any changes to the frame will not match the original hash value. i. j. What attack does MIC prevent? bit flip attacks Why do the Aironet extensions have to be used? TKIP is a Cisco proprietary implementation.
327 - 430
a. Remove MIC and PPK configured from the previous step. b. Check the Enable Rotation with Interval radio button. c. Enter a value of 90 seconds. d. Click Apply-All
e. From the SECURITY Page, verify Key Rotation is enabled. f. Verify connectivity from PC2 to the AP.
From the SECURITY>Encryption Manager Page. a. Remove Key Rotation configured from the previous step. b. Check the Cipher radio button. c. Choose the TKIP option in the drop down list d. Click Apply-All
328 - 430
e. From the SECURITY Page, verify TKIP is enabled. f. Verify the wireless connection from PC2 and the AP. g. Return to step 5c and try some of the various Cipher settings. Verify the changes from the SECURITY Page.
a. From the SECURITY>SSID Manager Page, check the Authenticated Key Management options. Using Cisco Centralized Key Management (CCKM), authenticated client devices can roam from one AP to another without any perceptible delay during reassociation. An AP on the network provides Wireless Domain Services (WDS) and creates a cache of security credentials for CCKM-enabled client devices on the subnet. The WDS AP cache of credentials dramatically reduces the time required for reassociation when a CCKM-enabled client device roams to a new AP. When a client device roams, the WDS AP forwards the client's security credentials to the new AP, and the reassociation process is reduced to a two-packet exchange between the roaming client and the new AP. Roaming clients reassociate so quickly that there is no perceptible delay in voice or other timesensitive applications. Wi-Fi Protected Access (WPA) is a standards-based, interoperable security enhancement that strongly increases the level of data protection and access control for existing and future wireless LAN systems. It is derived from and will be forward-compatible with the upcoming IEEE 802.11i standard. WPA leverages TKIP (Temporal Key Integrity Protocol) for data protection and 802.1X for authenticated key management. WPA key management supports two mutually exclusive management types: WPA and WPA-Preshared key (WPA-PSK). Using WPA key management, clients and the authentication server authenticate to each other using an EAP authentication method, and the client and server generate a pairwise master key (PMK). Using WPA, the server generates the PMK dynamically and passes it to the AP. Using WPA-PSK, a pre-shared key must be configured on both the client and the AP, and that pre-shared key is used as the PMK.
329 - 430
Cipher Suites Compatible with WPA and CCKM Authenticated Key Management Types CCKM
encryption mode cipher wep128 encryption mode cipher wep40 encryption mode cipher ckip encryption mode cipher cmic encryption mode cipher ckip-cmic encryption mode cipher tkip encryption mode cipher tkip wep128 encryption mode cipher tkip wep40
WPA
encryption mode cipher tkip encryption mode cipher tkip wep128 encryption mode cipher tkip wep40
330 - 430
Objective
Configure a site-to-site bridged network using enterprise security features.
Scenario
A remote location located several miles away requires connectivity to the existing wired network. The connection can be bridged wirelessly with the use of two BR350s. The companys security policy mandated a minimum of 128 bit WEP security for all wireless connections.
Topology
331 - 430
Preparation
In this lab, the following will be configured. Device Name BPod1 BPod2 Label BR1 BR2 SSID BR1 BR1 Address 10.0.1.1/16 10.0.2.1/16
Press = to display the home page of the bridge. If the bridge has not been configured before, the Express Setup page appears as the home page. If this is the case, go to Step 3.
d. If the bridge is already configured, the Summary Status page appears as the home page. When Summary Status screen appears, type :resetall, and press Enter.
Enter "YES" to confirm Resetting All parameters to factory defaults: YES 00:02:12 (FATAL): Rebooting System due to Resetting Factory Defaults *** Restarting System in 5 seconds...
e. Type yes, and press Enter to confirm the command. f. Power cycle the bridge by removing the power.
332 - 430
333 - 430
e. If the Express Setup Page does not appear, from the Summary Status Page click on the Setup hyperlink. This will bring up the Setup Page.
f.
Click on the Express Setup link. This will bring up the Express Setup Page.
334 - 430
Configure the following settings: Parameter a. System Name: b. Configuration Server Protocol: c. Default IP address: d. Default Gateway: e. Service Set ID: f. Role in Radio Network: BPod1 BPod1 None 10.0.1.1 10.0.1.254 BR1 Root Bridge BPod2 BPod2 None 10.0.2.1 10.0.1.254 BR1 Non-Root Bridge w/o Clients
g. Click Apply. The connection will drop. h. Configure the PCs. i. j. k. PC1 with an IP address of 10.0.1.10/16 PC2 with an IP address of 10.0.2.10/16
Reconnect to the using the browser. Enter 10.0.P.1 and connect. Verify the settings. What roles can the bridge serve in the network? Answer:
l.
Why would the BR350 be used in Root AP mode, compared to using a 1200 or 1100 AP? The BR350 is made for harsh environments such as outdoor or industrial settings where the 1200 may not be suited.
335 - 430
h. Why are 2 bridges able to connect at longer distances? The bridge modifies the wireless frame timing.
Follow these steps to set up WEP keys and enable WEP: a. On the Summary Status page, click Setup. b. On the Setup page, click Security. c. On the Security Setup page, click Radio Data Encryption (WEP). d. From the Root Radio Data Encryption page. e. Before WEP can be enabled, a WEP key must be entered in at least one of the Encryption Key fields. f. Use the Key Size pull-down menu to select the 128-bit encryption for the WEP Key 1. g. Click in the Encryption Key field and enter a WEP key. h. How many digits must be entered for 128 bit WEP? 26
336 - 430
i. j.
Record the key below. Answers will vary. Example: 12345678909876543210123456 Click Apply to save the WEP Key.
k. l.
Notice that the Drop down box appears next to the Use of Data Encryption by Stations is. Select Full Encryption from the pull-down menu labeled Use of Data Encryption by Stations is. Click OK, which returns the bridge to the Security Setup Page.
337 - 430
WEP Key Setup Example Bridge (Root) Transmit? 1 2 3 4 x Key Contents Transmit? x Non-Root Device Key Contents
Key Slot
12345678901234567890abcdef 09876543210987654321fedcba
not set not set
12345678901234567890abcdef 09876543210987654321fedcba
not set not set
Because the bridge WEP key 1 is selected as the transmit key, WEP key 1 on the other device must contain the same contents.
338 - 430
339 - 430
b. From the Root Radio Advance page, select MMH from the drop down list for the Enhanced MIC verification for WEP:. c. Verify the Use Aironet Extensions is selected as yes. d. Click the Apply button. The wireless link will be lost with the other bridge. e. Configure the other bridge with the same security setting. f. The link should be re-established. g. From the Root Radio Advance page, select Cisco from the drop down list for the Temporal Key Integrity Protocol:. h. Verify the Use Aironet Extensions is selected as yes. i. j. k. Click the Apply button. The wireless link will be lost with the other bridge. Configure the other bridge with the same security setting. The link should be re-established. l. What attack does TKIP prevent? Initialization Vector attacks Why do the Aironet extensions have to be used? TKIP is a Cisco proprietary implementation. From the Root Radio Advance page, select enter a value of 90 seconds as the Broadcast WEP Key rotation interval.
m. Click the Apply button. The wireless link will be lost with the other bridge. n. Configure the other bridge with the same security setting. o. The link should be re-established. What attack does BKR prevent? Initialization Vector attacks
340 - 430
Lab 8.5.4.3 BR1310 Configuring Site-to-Site Wireless Link using Enterprise Security
Estimated Time: 45 minutes Number of Team Members: Students will work in teams of 2.
Objective
Configure a site-to-site bridged network using enterprise security features.
Scenario
A remote location located several miles away requires connectivity to the existing wired network. The connection can be bridged wirelessly with the use of two BR1310s. The companys security policy mandated a minimum of 128 bit WEP security for all wireless connections.
Topology
341 - 430
Preparation
In this lab, the following will be configured. Device Name BPod1 BPod2 SSID BR1 BR1 BVI Address 10.0.1.1/16 10.0.2.1/16
e. Turn off notification logging to avoid interruptions as you enter commands. PodP#configure terminal PodP(config)#logging console 4 f. Erase the configuration with the following commands: PodP#erase startup-config Erasing the nvram filesystem will remove all files! Continue? [confirm] (press Enter) [OK] Erase of nvram: complete PodP# reload
342 - 430
System configuration has been modified. Save? [yes/no]: Proceed with reload? [confirm] (press Enter) g. After the system reboots, repeat the step to turn off notification logging. h. Assign an IP address and address mask to the BVI. PodP(config)#interface bvi1 PodP(config-if)#ip address 10.0.P.1 255.255.0.0 i. Configure the PCs. PC1 with an IP address of 10.0.1.10/16 PC2 with an IP address of 10.0.2.10/16
g. Click Apply to save these changes. h. Navigate to the Express Security page and configure the SSID: BR1 i. Verify the settings on both bridges. Navigate to the Association page to confirm that the bridges have associated.
________________________________________________________________________
343 - 430
__________________________________________________________________________
e. Click Apply to save the WEP Key. f. Repeat the same steps on the other bridge.
b. Repeat the FTP download process from PC1 to PC2. Observe the download performance across the wireless link. c. What was the download speed in Mbps? Did WEP have an impact on performance?
_________________________________________________________________________
f. View the Security Summary via the web browser for an overview of the security settings.
345 - 430
346 - 430
Objective
The student will extend VLANs into a WLAN.
Scenario
VLANs can be extended into a WLAN by adding IEEE 802.11Q tag awareness to the AP. Frames destined for different VLANs are transmitted by the AP wirelessly on different SSIDs with different WEP keys. Only the clients associated with that VLAN receive those packets. Conversely, packets coming from a client associated with a certain VLAN are 802.11Q tagged before they are forwarded onto the wired network. The basic wireless components of a VLAN consist of an AP and a client associated to it using wireless technology. The AP is physically connected through a trunk port to the network VLAN switch on which the VLAN is configured. The physical connection to the VLAN switch is through the AP Ethernet port. A router is also necessary to route between the different VLANs. Up to 16 SSIDs can be configured on the AP, hence 16 VLANs are supported. Configuring the AP to support VLANs is a three-step process: 1. Create SSIDs and assign authentication settings to SSIDs. 2. Assign SSIDs to VLANs and enable the VLAN on the radio and Ethernet ports.
Topology
347 - 430
Preparation
Team Access Point Name PodP SSID VLAN Authentication Bridge group 1 101 102 103 BVI Address 10.0.P.1/24
Additional Materials
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_installation_and_configuration_gu ide_book09186a0080147d69.html
From the EXPRESS SET-UP page, configure the System Name and BVI address.
348 - 430
From the SECURITY>SSID Manager page, configure the 802.11b radio management, voice, data, and guest SSIDs, and authentication type according to the Preparation table. a. Enter the management SSID in the SSID: box. b. Select the authentication method. c. Click Apply. 1. Why is VLAN ID 10 used for the management VLAN instead of VLAN ID 1? It is more secure. d. Repeat the steps for the voice, data, and guest SSIDs.
349 - 430
From the SERVICES>VLAN page, configure the 802.11b radio for management, voice, data, and guest VLANs according to the Preparation table. a. Enter VLAN ID 10 in the VLAN ID: box. Since this is the management VLAN, check the Native VLAN box. Also, check the Radio0-802.11B. b. Choose the management SSID from the SSID drop down box. c. Click Apply. d. Repeat the steps for the voice, data, and guest VLANs.
From the SECURITY home page a. Verify the VLAN configuration through the GUI
350 - 430
bridge-group 1 spanning-disabled ! interface Dot11Radio0.101 encapsulation dot1Q 101 no ip route-cache bridge-group 101 bridge-group 101 subscriber-loop-control bridge-group 101 block-unknown-source no bridge-group 101 source-learning no bridge-group 101 unicast-flooding bridge-group 101 spanning-disabled ! interface Dot11Radio0.102 encapsulation dot1Q 102 no ip route-cache bridge-group 102 bridge-group 102 subscriber-loop-control bridge-group 102 block-unknown-source no bridge-group 102 source-learning no bridge-group 102 unicast-flooding bridge-group 102 spanning-disabled ! interface Dot11Radio0.103 encapsulation dot1Q 103 no ip route-cache bridge-group 103 bridge-group 103 subscriber-loop-control bridge-group 103 block-unknown-source no bridge-group 103 source-learning no bridge-group 103 unicast-flooding bridge-group 103 spanning-disabled ! interface Dot11Radio1 no ip address no ip route-cache speed basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0 rts threshold 2312 station-role root bridge-group 1 bridge-group 1 subscriber-loop-control bridge-group 1 block-unknown-source no bridge-group 1 source-learning no bridge-group 1 unicast-flooding bridge-group 1 spanning-disabled ! interface FastEthernet0 no ip address no ip route-cache duplex auto speed auto ! interface FastEthernet0.10 encapsulation dot1Q 10 native no ip route-cache bridge-group 1 no bridge-group 1 source-learning bridge-group 1 spanning-disabled ! interface FastEthernet0.101 encapsulation dot1Q 101
352 - 430 Fundamentals of Wireless LANs v 1.2 Lab 8.6.2 Copyright 2003, Cisco Systems, Inc.
no ip route-cache bridge-group 101 no bridge-group 101 source-learning bridge-group 101 spanning-disabled ! interface FastEthernet0.102 encapsulation dot1Q 102 no ip route-cache bridge-group 102 no bridge-group 102 source-learning bridge-group 102 spanning-disabled ! interface FastEthernet0.103 encapsulation dot1Q 103 no ip route-cache bridge-group 103 no bridge-group 103 source-learning bridge-group 103 spanning-disabled ! interface BVI1 ip address 10.0.P.1 255.255.255.0 no ip route-cache ! ip http server ip http help-path http://www.cisco.com/warp/public/779/smbiz/ prodconfig/help/eag/ivory/1100 bridge 1 route ip ! ! line con 0 line vty 0 4 login local line vty 5 15 login ! end PodP#
353 - 430
a. Now create the SSIDs for the 802.11a radio and apply to the existing VLANs . b. Verify the settings afterwards through the SECURITY home page. c. Verify the setting through IOS CLI. d. Return to Step 6 and configure 2 802.11a clients. Verify the connections. e. Save the configuration to a text file.
354 - 430
a. Now create the SSIDs for the 802.11a radio and apply to the existing VLANs. b. Verify the settings afterwards through the SECURITY home page. c. Verify the setting through IOS CLI. d. Return to Step 6 and configure 2 802.11a clients. Verify the connections. e. Save the configuration to a text file.
a. Change the BVI address to a 16 bit mask. b. Configure the IP addresses on the wireless PCs with a 16 bit mask c. Test connectivity between the PCs in VLAN 103. d. Attempt to connect to the BVI address from the wireless PCs located in VLAN 103. Notice there is no connectivity between VLANs, only within VLANs. e. Configure LEAP authentication for the data VLAN and test connectivity between pods PCs which are connecting through Data profiles. f. Notice that there in no connectivity between VLANs. If time permits, configure a router on a stick to route between the VLANs. If using an enterprise 3550 or routing capable switch, inter VLAN routing can be configured without using a router.
Fundamentals of Wireless LANs v 1.2 Lab 8.6.2 Copyright 2003, Cisco Systems, Inc.
355 - 430
356 - 430
Objective
In this lab, students will identify various applications of wireless local area networks (WLANs). The student will then choose one application and detail a WLAN design for it. The detailed design should utilize all of the following to present their findings: Drawings Configurations Topologies Issues Advantages Disadvantages Challenges Any other useful information
Scenario
The four main design requirements for a WLAN solution are as follows: It must have high availability It must be scalable It must be manageable It must be an open architecture allowing integration with third-party equipment Same principles apply to all WLAN designs Get to know the customer and the customers needs Design the WLAN to meet those needs
Along with the design requirements there are a few WLAN design basics:
Preparation
The student will read and understand the material presented in FWL Module 9 prior to the lab.
Provide a brief summary of the business. Answers will vary depending on the business or industry. Example: Our team will design a WLAN application for a small retail store specializing in the sale of jewelry.
358 - 430
Step 7 Interference
The following steps must be taken when dealing with potential interference to the WLAN: Identify the typical sources of RF interference for the type of industry that the WLAN application is being designed for. Locate each type of RF interference and note a possible option or solution for this type of interference. Note the sources of RF interference on the diagram. Answers will vary depending on the business or industry. Example: There are glass display cases throughout the store that may cause some reflection and refraction of the RF signal. A site survey will determine if this will be a problem and if a solution is required to overcome any degradation caused by reflected or refractive signaling.
359 - 430
Step 8 Encryption
Encryption must also be considered depending on the client and the industry the WLAN is being designed for: What are the data security and privacy requirements of the customer? What methods will be used to ensure their privacy and security requirements for the wireless LAN? No encryption 40 bit encryption 128 bit encryption Note the advantages and disadvantages of each. With NO Encryption, any wireless client will be able to capture the data on the wireless network, the wireless clients have no expectation of data privacy. With 40 bit WEP, the wireless client data is partially secure, but there are tools available that can easily decipher a 40 bit encrypted data/message if properly captured. With 128 bit WEP, the data on the wireless network is considered reasonably secure, but there are tools that are able to eventually encrypt the data given the appropriate time. Example: The customer wishes to have 128 bit WEP enabled for a reasonable solution for data privacy.
360 - 430
Objective
In this lab, students will operate the Link Status Meter (LSM) utility for the wireless client adapter. Students will then learn how to set the Preferences options for the Aironet Client Utilities (ACU).
Scenario
This section explains how to use the LSM utility to determine the performance of the radio frequency (RF) link between the client adapter and its associated AP. The second section explains how to set optional Preferences for the Aironet Client Utility.
Preparation
The student will read and understand the material presented in FWL Module 9 prior to the lab.
361 - 430
362 - 430
363 - 430
Objective
The student will learn how to use the Cisco Bridge Range Calculation Utility to determine bridge distances based on the following: Type of bridge Antenna Cables Splitter Other applicable wireless connectors
Scenario
Cisco makes it easy to calculate bridge distances by using the Cisco distance calculations spreadsheet that is available from the Cisco Web site. These values are for line-of-sight and provide a 10dB fade margin, which helps assure that the calculations will work.
Preparation
The student should download the Cisco Bridge Range Calculation Utility at the following link: http://www.cisco.com/application/vnd.msexcel/en/us/guest/products/ps458/c1225/ccmigration_09186a00800a912a.xls
364 - 430
365 - 430
f.
Add any other losses due to splitters, connectors and so forth into the misc. column. 20dBm, or 2.4 GHz, for the transmitter power - 13.5 dBi yagis antennas 2 cables of 20 feet each
The Bridge range calculation tool gives a maximum distance of approximately 2.8 miles. a. What is the maximum distance when changing the data rate to 5.5Mbps? 2.8 miles or 4.6 Kilometers b. What is the maximum distance when changing the data rate to 2Mbps? 5.7 miles or 9.2 Kilometers c. What is the maximum distance when changing the data rate to 1Mbps? 7.2 miles or 11.5 Kilometers d. What is an easy way to extend the maximum distance while using the same power settings and antenna? Changing the data rate of the AP
366 - 430
Objective
In this lab, the student will determine the best placement and coverage, or overlap, for the wireless APs. This will be done through the use of the wireless client adapter site survey utility.
Scenario
A site survey provides detailed information about all of the following: Where the APs are to be located How they will be mounted How they will be connected to the network Where any cabling or power may need to be installed
The Aironet Client Utility (ACU) site survey tool operates at the radio frequency (RF) level and is used to determine the best placement and coverage, or overlap, for APs. During the site survey, the current status of the network is read from the client adapter and displayed four times per second so network performance can be accurately gauged. The feedback received can help to eliminate areas with low RF signal levels that can result in a loss of connection between the client adapter and its associated AP. The site survey tool can be operated in two modes: Passive Mode This is the default site survey mode. It does not initiate any RF network traffic. It simply listens to the traffic that the client adapter hears and displays the results. Active Mode This mode causes the client adapter to actively send or receive low-level RF packets to or from its associated AP. It then provides information on the success rate. It also allows parameters to be set governing how the site survey is performed.
Preparation
The student will read and understand the material presented in FWL Chapter 10 prior to the lab. Perform the site survey when the RF link is functioning with all other systems and noise sources operational. Execute the site survey entirely from the mobile station. When using the active mode, conduct the site survey with all variables set to operational values.
An AP with a valid IP address PC or laptop with a client adapter and client utilities installed
Copyright 2003, Cisco Systems, Inc.
From the Client Utility Site Survey Passive Mode screen click the Setup button. The Site Survey Active Mode Setup screen looks like the example below.
368 - 430
369 - 430
370 - 430
The Site Survey Active Mode screen appears. Position the Laptop PC in various locations relative to the AP. Note the changes in the indicator field values listed below: a. What is the signal strength? Answers will vary. Document the measurement on your screen. Example: 65% b. What is the signal quality? Answers will vary. Document the measurement on your screen. Example: 13% c. What is the link speed? Answers will vary. Document the measurement on your screen. Example: 11Mbps d. What is the overall link quality? Answers will vary. Document the measurement on your screen. Example: POOR e. How many packets were lost to target? Answers will vary. Document the measurement on your screen. Example: 0 f. How many packets were lost to source? Answers will vary. Document the measurement on your screen. Example: 0
371 - 430
When the Stop button is clicked or the Percent Complete reaches 100%, the active mode changes back to the passive mode. Click OK or Cancel to exit the site survey application.
372 - 430
Objective
In this lab, students will perform a site survey of an assigned location. Students should include all of the following in site survey results: Channel selections Data rates Antenna selection
Scenario
A site survey provides detailed information about the following: Where the APs are to be located How they will be mounted How they will be connected to the network Where any cabling or power may need to be installed
By providing the customer with a detailed site survey report, the IT manager can turn the necessary portions over to a local contractor. The contractor can then install the network cabling and power cabling that may be needed to provide the wireless local-area network (WLAN) connectivity to the network.
373 - 430
Preparation
The student should perform all of the following in preparation for this lab: Read through the lab prior to conducting the site survey. Perform the site survey when the RF link is functioning with all other systems and noise sources operational. Execute the site survey entirely from the mobile station. Conduct the site survey with all variables set to operational values for use in the active mode. Obtain a site map and permission to use the areas that are to be surveyed in advance.
374 - 430
The easiest way to start a site survey is to pick one area of the facility that needs coverage. Choose a corner and place the AP in that corner. Survey the coverage of that AP and make a note of where the furthest point of coverage is from it. Then move the AP to the furthest coverage point.
Note If the AP is placed in the corner, as much as 75 percent of your coverage cell might be wasted covering an area outside the building that does not need coverage.
Sketch the actual site below which is surveyed. Indicate where the AP is located. Draw the pattern of coverage.
375 - 430
Once the AP has been moved, survey its coverage. It may be necessary to move the AP several times in order to find the best placement. Once the best location for that AP has been decided on, move to a different corner of the facility and repeat the process. In a more advanced survey, repeating the process four times might only provide coverage around the perimeter of the facility. Now fill in the holes in coverage. This is where experience and judgment will come into play. Some engineers might elect to survey the perimeter and then fill in the center. Remember, if seamless coverage is needed, the coverage cells must overlap. For a standard survey, 15 percent overlap is usually sufficient to provide for smooth, transparent handoffs. Sketch the actual site below which is surveyed. Indicate where the APs will be located. Draw the patterns of coverage.
376 - 430
Survey the first two areas and fill in the middle Another approach is to survey the first two APs and find the coverage areas. Place an AP at the edge of the first AP cell, survey the coverage, and then move the AP out further to utilize its entire cell. This allows the size of the cell to be roughly judged. Then survey the new location to determine feasibility and adjust as necessary. Once the AP location has been decided, continue this process until the entire facility is covered.
377 - 430
When surveying, take into account the fact that there are only three non-overlapping channels when using 802.11b and 802.11g. In order to maximize the data rate, use these channels. Using the nonoverlapping channels insures that the APs will not interfere with each other. As the WLAN is being designed, survey using the channel that the AP is intended to operate on. Part of the surveying duties is to test for interference. If every AP is surveyed using the same channel, andnot the actual channel the AP will be using, it will be difficult to verify that no interference exists on the channel that the AP will actually be using. Sketch the actual site below which is surveyed. Indicate where the APs will be located and the channels to be used. Draw the patterns of coverage.
378 - 430
Once the minimum data rate that the customer will be using has been determined, survey at that data rate. The data rate that is chosen will drastically affect the results of the site survey. In the example in the figure, the same area is surveyed at two different data rates. If the survey is done at 2Mb it takes six APs to cover the facility. If the survey is done at 5.5Mb it might take twelve APs to cover the facility.
379 - 430
The student may elect to use a different antenna to obtain more coverage from the APs, use smaller antennas and add more APs. Another possibility is changing the power levels on one or more of the APs to change the size of the coverage cell or cells. Finally, the student may elect to use a combination of these options to get the coverage they need.
380 - 430
Objective
The objective of this lab is to explore wireless installation options and methods for: BR350 AP1200
Scenario
Proper installation techniques are required to complete a safe and professional installation. Students should demonstrate proficiency using drywall or concrete anchors and wood screws. Proper routing and anchoring of Ethernet cables can be covered as well.
Additional resources
http://www.chatsworth.com/main.asp?id=27 http://www.nema-enclosures.cc/ http://www.nema.org/ http://ulstandardsinfonet.ul.com/scopes/2043.html
381 - 430
Always consult the instructor before drilling in any surface. Never drill additional holes in antennas, APs, or bridges as this will void the warranty Make sure any electrical power is turned off Always have a person hold the ladder when in use. Always create a buffer zone with bright markers or cones
The 1200 AP meets Underwriters Laboratories (UL) 2043 certification, and has an extended operating temperature of (-20 to 55C or -4 to 131F). Keep this in mind when deciding where to mount the AP. The AP ships with a detachable mounting bracket and the necessary mounting hardware. Because it is detachable, the mounting bracket can be used as a template to mark the positions of the mounting holes for the installation. Then install the mounting bracket and attach the AP when ready. The mounting bracket provides a professional look to the installation.
382 - 430
Install the anchors into the wall if using them. Otherwise, go to Step 4.
d. Secure the mounting bracket to the surface using the #8 fasteners. e. Attach the AP to the mounting bracket.
Note The installation can be made more secure by mounting it to a stud or major structural member and using the appropriate fasteners. On a vertical surface, mount the bracket with its security hasp facing down.
1 2 3 4 5
Suspended ceiling T-rail Caddy fastener Plastic spacer Mounting bracket Keps nut
383 - 430
Single Band
Dual Band
Follow these steps to mount the AP on a suspended ceiling or as directed by the instructor. a. Determine where to mount the AP. b. Attach two caddy fasteners to the suspended ceiling T-rail. c. Use the mounting bracket to adjust the distance between the caddy fasteners so that they align with the holes in the mounting bracket.
d. Use a standard screwdriver to tighten the caddy fastener studs in place on the suspended ceiling T-rail. Do not overtighten. e. Install a plastic spacer on each caddy fastener stud. The legs of the spacer should contact the suspended ceiling T-rail. f. Attach the mounting bracket to the caddy fastener studs and start a Keps nut on each stud. g. Use a wrench or pliers to tighten the Keps nuts. Do not overtighten. h. Attach the AP to the mounting bracket.
d. Attach and adjust the antenna(s) or antenna cables. e. Connect the Ethernet cable to the Ethernet port of the AP. f. Insert the 1200 series power module cable connector into 48 VDC power port of the AP, if using a local power source.
384 - 430
Other options
The AP can be mounted using nylon or metal tie wraps. Also, wood blocks can be attached to steel beams. Plywood can be attached to concrete walls to provide a buffer against moisture. Attaching a mounting bracket to wood is much easier than mounting directly to steel or concrete.
385 - 430
a. If the original mounting template cannot be found, create a mounting template to drill four holes in the wall. Take the BR350 and trace the outline of the bridge and the holes on a separate piece of cardstock or paper. Or, check it with the one shown above. b. Mark the holes on the wall. c. Drill the holes. The holes should be 3/16 in. (0.48 cm) in diameter and 1 in. (2.54 cm) deep. d. Tap the wall anchors into the holes. e. Drive three screws into the wall anchors corresponding to the key-holes in the mounting template, leaving a small gap between the screw head and the anchor. f. Position the keyholes of the case over the screws and pull down to lock it in place. g. Drive the remaining screw into the fourth wall anchor and tighten all mounting screws. h. Connect the Ethernet cable to the AP or bridge. i. If the AP or bridge has removable antennas, connect the antennas or antenna cables to the AP or bridge.
386 - 430
Ceiling Mounted Enclosures from Chatsworth include: AAT-CAP-35 - Faceplate for Cisco 350 AAT-CAP-11 -Faceplate for Cisco 1100 AAT-CAP-12 Faceplate for Cisco 1200
387 - 430
Consult with the local, state, and federal guidelines for the proper enclosure. Below are NEMA Rating levels.
NEMA 1 2 3 3R 4 4X 6 6P 12 13
Use indoor indoor outdoor outdoor indoor indoor / outdoor Indoor / outdoors Indoor / outdoors Indoor / outdoors indoor
Protection Against hand contact with enclosed equipment. low cost enclosure but suitable for clean and dry environments. limited amounts of falling dirt and water Wind-blown dust, rain, and sleet; ice which forms on the enclosure. falling rain and sleet; ice which forms on the enclosure windblown dust and rain, splashing water, and hose directed water; ice which forms on the enclosure corrosion, windblown dust and rain, splashing water, and hose directed water; ice which forms on the enclosure occasional temporary submersion occasional prolonged submersion. Corrosion protection dust, falling dirt, and dripping non-corrosive liquids dust, spraying of water, oil, and non-corrosive coolant
388 - 430
Objective
The objective of this lab is to prepare a request for proposal (RFP) for a fictitious business for adding a wireless local-area network (WLAN) to their business network.
Scenario
An RFP lists a customer's design requirements and the types of solutions a network design must include. Organizations send a RFP to vendors and design consultants. They use the responses they receive to help select a suitable vendor or supplier.
Preparation
The instructor will compile a list of approved fictitious businesses used for the RFP.
Step 1
Prepare a RFP that lists the design requirements of the business selected and the types of solutions for the network design. The RFP must include all of the following: Business goals for the project Scope of the project Information on the existing network and applications Information on new applications Technical requirements including the following: o o o o
389 - 430
o o o o
Warranty requirements for products Environmental or architectural constraints that could affect implementation Training and support requirements Preliminary schedule with milestones and deliverables Legal contractual terms and conditions
Client Requirements
One Month
Your role in this project: Organization (Select all that apply): Company size (# of employees): Location to implement the project (select all that apply): Number of distinct physical locations (# of network nodes): Average # of users per physical location (per network node): Name of the local phone service provider(s) near each physical location of the project:
Project Manager
Retail/Wholesale/Distribution Jewelry
San Jose, CA
3-10
1-8
ATT
390 - 430
To Be Determined
Required Wireless LAN Products: Required Speed for Wireless LAN: Network Security Requirement(s): Required Managed Security Services: Required Coverage Area for Network Security Service: Desired Plans for Managed Security Service: Required Tunneling Protocols for VPN Service: Required Encryption for VPN Service: Required Authentication for VPN Service: Service Level Agreement Requirements for VPN Service: Voice & Telephony Requirements:
AP
11 Mbps
VPN Service
Regional
SSL or IPSec
3DES or AES
Password
To Be Determined
To be Determined
391 - 430
Objective
In this lab, students will prepare a response to a request for proposal (RFP) for the addition of a wireless local-area network addition to an existing wired LAN. Compete against other student teams by responding to the same RFP.
Scenario
In the previous lab, a RFP was prepared for a fictitious business seeking to add a wireless local area network to their existing network. The instructor has reviewed those RFPs and has decided that each team will respond to the RFP. Organizations send a RFP to vendors and design consultants. They then use the responses they receive to weed out suppliers that cannot meet requirements. RFP responses help organizations compare all of the following presented by competing suppliers: Designs Product capabilities Pricing Service Support alternatives
Despite the fact that a response to an RFP must stay within the guidelines specified by the customer, use ingenuity to ensure that the response highlights the benefits of the design. Base the response on an analysis of the customer's business and technical goals, and the flow and characteristics of network traffic. Write the response so the reader can easily recognize that the design satisfies critical selection criteria. When writing the response, be sure to consider the competition. Try to predict what other vendors or design consultants might propose and then call attention to the aspects of this solution that are likely to be superior to competing designs. In addition, pay attention to the customer's business style. Remember the importance of understanding the customer's biases and any office politics or project history that could affect the perception of the proposed design.
Preparation
The instructor will choose one RFP prepared from lab 10.5.2. All the student groups will use this RFP. All student teams will be responding to the same RFP chosen by the instructor.
392 - 430
Step 1
The RFP states that the response must include some or all of the following topics: A network topology for the new design Information on the protocols, technologies, and products that form the design An implementation plan A training plan Support and service information Prices and payment options Qualifications of the responding vendor or supplier Recommendations from other customers for whom the supplier has provided a solution Legal contractual terms and conditions
393 - 430
Objective
In this lab, students will review the response written to the request for proposal (RFP) and determine whether the response meets the requirements of the RFP. Students shall rank the responses according to how well they addressed the RFP.
Scenario
Organizations use the responses they receive to eliminate suppliers that cannot meet requirements. RFP responses help organizations compare all of the following presented by competing suppliers: Design Product capabilities Pricing Service and support alternatives Security
Use the comparison chart for the responses to rank them prior to this lab.
TEAM 1 TEAM 2 TEAM 3 TEAM 4 TEAM 5 TEAM 6 TEAM 7 TEAM 8 TEAM 9 TEAM 10
394 - 430
TEAM
DESIGNS (3X)
PRICING (4X)
TRAINING (2X)
SECURITY (5X)
TEAM 1 TEAM 2 TEAM 3 TEAM 4 TEAM 5 TEAM 6 TEAM 7 TEAM 8 TEAM 9 TEAM 10
395 - 430
The ranking system can be based upon how well each of the teams addressed the projects criterion, for example the following can be used: 1 Poor 2 Satisfactory 3 Above Average 4 Excellent The score will take the ranking number and multiplier to assign a weighted score to the team. For example: TEAM 1 scored: Designs 2, the weighted score becomes 2 times 3 equaling 6. Product Capabilities 3, the weighted score becomes 3 times 5 equaling 15 Pricing 4, the weighted score becomes 4 times 4 equaling 16 Service 3, the weighted score becomes 3 times 3, equaling 9 Training 3, the weighted score becomes 3 times 2 equaling 6 Security 2, the weighted score becomes 2 times 5 equaling 4
SERVICE and SUPPORT (3X)
TEAM
DESIGNS (3X)
PRICING (4X)
TRAINING (2X)
SECURITY (5X)
TEAM 1 TEAM 2 TEAM 3 TEAM 4 TEAM 5 TEAM 6 TEAM 7 TEAM 8 TEAM 9 TEAM 10
15
16
10
TEAM 1s total score becomes 6 + 15 + 16 + 9 + 9 + 4 = 59 Score each team. The team with the largest numerical score wins the contract.
396 - 430
Objective
In this lab, the student will utilize basic troubleshooting procedures for problems with an AP.
Scenario
Troubleshooting networks, including WLANs, is more important than ever. Networks continue to add services as time goes on and with each added service comes more variables involved in implementing networks. This adds to the complexity of troubleshooting the networks as well. So, organizations increasingly depend on network administrators and network engineers having strong troubleshooting skills.
a. If the AP is not communicating, check the three indicators on the top panel. These indicators can be used to quickly assess the status of the unit. b. The indicator lights have the following meanings: c. The Ethernet indicator signals traffic on the wired LAN, or Ethernet infrastructure. This indicator blinks green when a packet is received or transmitted over the Ethernet infrastructure. Answers will vary, but generally it should blink when a packet is being received or transmitted. Example: Yes
397 - 430 Fundamentals of Wireless LANs v 1.2 Lab 11.1.4 Copyright 2003, Cisco Systems, Inc.
e. The Status indicator signals operational status. Blinking green indicates that the AP is operating normally but is not associated with any wireless devices. Steady green indicates that the AP is associated with a wireless client. f. Is the status of the AP associated or not associated? Answers will vary, but generally the Status Indicator light should be green when a wireless client is associated to it. Example: Associated g. The Radio indicator blinks green to indicate radio traffic activity. The light is normally off, but it blinks green whenever a packet is received or transmitted over the radio of the AP. h. Is there radio traffic on your AP? Yes or No Answers will vary, but generally the Radio Indicator Light should blink when a packet is being received or transmitted. Example: Yes
a. Check the Service Set Identifier (SSID) of the AP and client. Mismatched basic settings are the most common causes of lost connectivity with wireless clients. Wireless clients attempting to associate with the AP must use the same SSID as the AP. b. Verify authentication is set to Open on the AP and client. Shared Key exposes the Wired Equivalent Protocol (WEP) key unnecessarily due to weaknesses in design.
398 - 430
a. The WEP key used to transmit data must be set up exactly the same on the AP and any wireless devices with which it associates. Make sure to enter the key in hexadecimal on the client and AP.
399 - 430
b. If there is a possibility that the AP WEP Key and the Client Adapter WEP Key are not congruent to each other, reset the WEP setting to the default configuration or overwrite the current WEP Key. c. If the password that allows the AP to be configured is unknown, or if major changes to the configuration need to be made, the configuration may need to be completely reset.
400 - 430
Objective
In this lab, standard TCP/IP commands are utilized to troubleshoot connectivity problems between the wireless client and the AP.
Scenario
Basic troubleshooting for TCP/IP on Windows machines combines facts gathered from the perspective of all of the following: The router The switch The bridge The AP The Windows client or server
Check to see if it is possible to connect using IP addresses. Use an IP address as a target for the standard TCP/IP commands such as ping, tracert, and telnet. Basic IP setup can be verified with the winipcfg utility for Windows 95 and 98 and the ipconfig utility for Windows NT, 2000, and XP.
Preparation
The student should read and understand the material presented in FWL Chapter 11 prior to the lab.
Additional materials
Microsoft http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/winxppro/proddocs/t cpip_utils.asp
401 - 430
Step 1 Ping
The ping command can be used to confirm basic network connectivity on IP networks. For IP, the ping command sends Internet Control Message Protocol (ICMP) Echo messages. ICMP is the Internet protocol that reports errors and provides information relevant to IP packet addressing. If a station receives an ICMP Echo message, it sends an ICMP Echo Reply message back to the source. It is a good idea to use the ping command when the network is functioning properly to see how the command works under normal conditions and to have something to compare against when troubleshooting. a. From the PC, ping the AP and examine the results.
C:\>ping 172.25.0.149
Reply from 172.25.0.149: bytes=32 time<10ms TTL=249 Reply from 172.25.0.149: bytes=32 time<10ms TTL=249 Reply from 172.25.0.149: bytes=32 time<10ms TTL=249 Reply from 172.25.0.149: bytes=32 time<10ms TTL=249
Ping statistics for 172.25.0.149: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = C:\> 0ms, Average = 0ms
Step 2 Tracert
The tracert tool on a Windows host reports each router a TCP/IP packet crosses on its way to a destination. It does essentially the same thing as the trace command in the Cisco IOS Software. The syntax for the tracert command is as follows: tracert [-d [-h maximum_hops] [-j host-list] [-w timeout] target_name. The following is an explanation of the parameters of the command: d specifies to not resolve addresses to host names (use recommended in test networks to avoid DNS delays) h maximum_hops - specifies the maximum number of hops to search for target j host-list specifies loose source route along the host list w timeout waits the number of milliseconds specified by timeout for each reply target_name name or IP address of the target host Errors that may occur include the asterisk (*) and the request timed out message. These messages indicate a problem with the router or a problem elsewhere on the network. The error may relate to a forwarded packet or one that timed out. Another common error is a report of destination network unreachable. This error usually indicates that network filtering is happening, likely from a firewall. It may also indicate a routing problem, such as a failed network link. a. From the PC, perform a tracert to http://www.cisco.com
C:\>tracert www.cisco.com
402 - 430
Tracing route to www.cisco.com [198.133.219.25] over a maximum of 30 hops: 1 2 3 4 5 6 7 8 9 <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms <10 ms sjc8-00-gw1.cisco.com [171.71.88.2] sjc2-dtb-gw1.cisco.com [171.71.240.105] sjc5-sbb4-gw1.cisco.com [171.71.241.153] sjc12-rbb-gw4.cisco.com [171.71.241.254] sjck-rbb-gw2.cisco.com [171.69.7.229] sj-wall-1.cisco.com [171.69.7.182] sjce-dirty-gw1.cisco.com [128.107.240.197] sjck-sdf-ciod-gw2.cisco.com [128.107.239.102] www.cisco.com [198.133.219.25]
Trace complete.
Step 3 Ipconfig
The command syntax for ipconfig and winipcfg is as follows: ipconfig [/all | /renew [adapter] | /release [adapter]] The following are the parameters of the command: All- Produces a full display. Without this switch, ipconfig displays only the IP address, subnet mask, and default gateway values for each network card. /renew [adapter]- Renews DHCP configuration parameters. This option is available only on systems running the DHCP Client service. To specify an adapter name, type the adapter name that appears when you use ipconfig without parameters. /release [adapter]- Releases the current dynamic host configuration protocol (DHCP) configuration. This option disables TCP/IP on the local system and is available only on DHCP clients. With no parameters, the ipconfig utility presents all of the current TCP/IP configuration values to the user, including IP address and subnet mask. To check the local host configuration, enter a DOS window on the host and enter the ipconfig /all command. This command shows your TCP/IP address configuration, including the address of the Domain Name System (DNS) server. If any of the IP addresses are incorrect or if no IP address is displayed, determine the correct IP address and edit it or enter it for the local host. a. Complete the information table below: IPCONFIG COMMAND Host Name Primary DNS Suffix Node Type IP Routing Enabled WINS Proxy Enabled DNS Suffix Search List Connection-specific DNS Suffix Description Physical Address DHCP Enabled Autoconfiguration Enabled IP Address Subnet Mask
403 - 430 Fundamentals of Wireless LANs v 1.2 Lab 11.2.6
INFORMATION ws1-w2k dns.company.com Hybrid No No company.com company.com Intel(R) PRO/100 VE Desktop Connection 00-02-55-7A-4B-C9 Yes Yes 172.180.161.54 255.255.0.0
Copyright 2003, Cisco Systems, Inc.
172.180.161.1 172.180.161.25 172.180.161.55 172.180.161.56 172.180.161.80 172.180.161.81 Wednesday, September 17 2003 Thursday, September 18 2003
Primary WINS Server Secondary WINS Server Lease Obtained Lease Expires
Step 4 Telnet
a. Telnet from the host PC to the AP to test layer 7 connectivity:
C:\>telnet 10.0.P.1 User Access Verification Username: Password: AP1200#
b. Was the Telnet successful? Answers may vary, but generally the answered should be YES. c. Which command will be used for testing in the following situations? Situation Host cannot access other hosts through AP or bridge. Host cannot access certain networks by the way of AP or bridge. Users can access some hosts, but not others. Some services are available and others are not. Users cannot make any connections when one parallel path is down. Certain protocols are blocked and others are not. Command ping ping, tracert ping ping tracert ping, tracert
404 - 430
http://www.cam.com/vxutil.html a. Perform an Internet search to find two other TCP/IP utlities? Record them below. Share with the class. Answers will vary. Examples: ABComplete Ping, Alert Ping, NetMaps.
405 - 430
Objective
In this lab, students will configure and use syslog logging to monitor network events.
Scenario
A network security administrator should always log significant events on the AP to the syslog server. A syslog server should be located on a secure internal network to ensure log integrity. The syslog server can be a dedicated server or another server running syslog services. A Syslog Server is a basic application that allows Aironet AP and bridge event information to be viewed from a Windows system. It includes all the following features: Receiving syslog messages through either TCP or UDP Full reliability because messages can be sent through TCP Ability to receive syslog messages from devices
Topology
406 - 430
Preparation
The student will read and understand material presented in FWL Chapter 11 prior to this lab. There are numerous syslog servers available on the Internet. This lab assumes that Kiwi Syslog Daemon is used. This is a freeware utility that can be downloaded at http://www.kiwisyslog.com. Download the syslog server and install the executable file.
Additional materials
Further information about the objectives covered in this lab can be found at the following website: http://www.kiwisyslog.com
Command List
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise. Command configure terminal logging on logging host show logging show running-config copy running-config startupconfig service timestamps log uptime service sequence-numbers Description Enter global configuration mode Enables Message Logging Log Messages to a syslog server host Verify the log settings and entries entries. Verify the active configuration in DRAM. Save the active configuration into Flash Enable log timestamps. Enable sequence numbers.
407 - 430
a. Click on the Kiwi Syslog Daemon Icon on the desktop to bring up the syslog screen.
a. Open up the AP browser menu and go to the EVENT LOG>Notification Options Page. b. Enable the Event Generate Syslog Messages utility on the AP c. Type in the Syslog Server Host IP address. This should be 10.0.P.10 d. Set the Syslog Facility logging level. The default, Local7, can be used. e. What other selections are available? Answer:
408 - 430
f.
Click the apply button to begin logging events to the Kiwi Syslog.
a. Generate events to the syslog by logging into the AP that is being monitored. b. Have the wireless users log onto the AP. c. Have the wireless users log off the AP. d. These changes will trigger a logged event on the syslog. What is the message that was displayed on the syslog? Answers will vary. Example: There should be messages indicating association and authentication. The Hostname IP address should be 10.0.P.1
409 - 430
f.
Configure the syslog message level to debugging. PodP(config)#logging trap debugging (or 7)
g. Enable the service timestamps on the AP using the following command: PodP(config)#service timestamps log uptime h. Enable the service sequence numbers on the AP logging using the following command: PodP(config)#service sequence-numbers
logging 10.0.1.10 ! [output omitted] b. Use the show logging command to view the entries.
PodP#show logging
Syslog logging: enabled (0 messages dropped, 2 messages rate-limited, 0 flushes, 0 overruns) Console logging: level debugging, 312 messages logged Monitor logging: level debugging, 0 messages logged Buffer logging: level debugging, 314 messages logged Logging Exception size (4096 bytes) Count and timestamp logging messages: disabled Trap logging: level informational, 316 message lines logged Log Buffer (4096 bytes): *Mar 4 04:44:28.924: %DOT11-6-DISASSOC: Interface Dot11Radio0, Deauthenticatin
Station 0007.8592.e4ea Reason: Previous authentication no longer valid *Mar 4 04:47:55.076: %DOT11-6-ASSOC: Interface Dot11Radio0, Station csawyer 00
9.b74c.b479 Associated KEY_MGMT[NONE] *Mar 4 04:51:36.967: %DOT11-4-MAXRETRIES: Packet to client 0009.b74c.b479 reac
ed max retries, remove the client *Mar 4 04:51:36.968: %DOT11-6-DISASSOC: Interface Dot11Radio0, Deauthenticatin
Station 0009.b74c.b479 Reason: Previous authentication no longer valid *Mar 4 05:36:44.416: %DOT11-6-ASSOC: Interface Dot11Radio0, Station KDEVIAEN-W
c.
To clear the log, use the following command: PodP#clear logging Clear logging buffer [confirm] PodP#
d. Issue the show log command again to view the clear log:
PodP#show log
Syslog logging: enabled (0 messages dropped, 2 messages rate-limited, 0 flushes, 0 overruns) Console logging: level debugging, 312 messages logged Monitor logging: level debugging, 0 messages logged Buffer logging: level debugging, 314 messages logged Logging Exception size (4096 bytes) Count and timestamp logging messages: disabled Trap logging: level informational, 316 message lines logged
411 - 430
412 - 430
Objective
In this lab, the student will install and configure the Kiwi Syslog Daemon to listen for SNMP logs. The student will configure the contact and location of the SNMP agent and test the configuration.
Scenario
SNMP is an application-layer protocol that facilitates the exchange of management information between network devices. It is part of the TCP/IP protocol suite. SNMP uses User Datagram Protocol (UDP) port 161 for most requests and responses. SNMP traps use UDP port 162.
Topology
Preparation
Team 1 2 AP Name Pod1 Pod2 SSID AP1 AP2 Address 10.0.1.1/24 10.0.2.1/24
413 - 430
Command list
In this lab exercise, the following commands will be used. Refer to this list if assistance or help is needed during the lab exercise: Command no snmp-server show snmp snmp-server community snmp-server contact snmp-server enable traps snmp snmp-server host snmp-server location Description Disable SNMP. Monitors SNMP status. Defines the community access string. Sets the system contact string. Enables the sending of traps, and specifies the type of notification to be sent. Configures the recipient of an SNMP trap operation. Sets the system location string.
414 - 430
b. Configure SNMP on Kiwi Syslog Daemon by checking the Listen for SNMP Traps box. Click the OK button to save the changes. UDP Port 162 d. What UDP port does SNMP Trap Watcher listen on?
415 - 430
a. Ensure the AP is configured according to the Topology and Preparation table. Ping from PC1, located at 10.0.P.10 to the AP to ensure connectivity. b. Browse to the SERVICES>SNMP Page of the AP. c. Click the Enabled radio button to Enable SNMP on the AP. d. Set a System Name (this is optional, but useful) e. Set a System Location (this is optional, but useful) f. Set a System Contact (this is optional, but useful) g. Complete the following information for your AP in the table below: System Name System Location System Contact AP1 Bulding 1, Room 200 John Doe
Create a public community string with Read Only. In a production environment, it is important to configure a unique string for increase security. SNMP read only provides monitoring through an SNMP management application.
416 - 430
SNMP read-write access monitoring and management using SNMP management applications. a. Click on the <NEW> in the Current Community String b. Create a private1234 community string with Read_Write c. Click the Apply button to create the string.
a. Set a SNMP Trap Destination by entering the IP address of PC1 located at 10.0.P.10. b. Set the SNMP Trap Community to public. c. Enable All Trap Notifications. d. Click the Apply button.
a. Click on the Kiwi Syslog Daemon Icon on the desktop to bring up the syslog application. The Kiwi Syslog Daemon can be customized or the defaults can be used. b. Have a wireless user connect to the bridge. c. Have the wireless user disconnect from the bridge.
417 - 430
Step 8 Set the system contact, and location of the SNMP agent through IOS CLI
Before beginning this step, reset the AP back to factory configuration. Configure the AP according to the Topology and Preparation table. a. Now configure the system contact and location: PodP(config)#snmp-server contact [name] [phone] PodP(config)#snmp-server location [location] b. What command would be used to verify this information on an AP? show running-config, show startup config, and show snmp
418 - 430
Step 11 Disable the SNMP traps on the AP by using the following commands
PodP(config)#no snmp-server enable traps PodP(config)#no snmp-server system-shutdown PodP(config)#no snmp-server trap-auth
Note By disabling SNMP trap notifications, which are not needed, the amount of free bandwidth can be increased and unnecessary SNMP processing tasks can be eliminated.
419 - 430
Objective
In this lab, students will configure and use syslog logging to monitor network events. Also, the student will configure the contact and location of the SNMP agent and test the configuration.
Scenario
A network security administrator should always log significant events on the bridge to the syslog or SNMP server. A server should be located on a secure internal network to ensure log integrity. The server can be a dedicated server or another server running syslog services or SNMP
Topology
Preparation
The student will read and understand material presented in FWL Chapter 11 prior to this lab.
420 - 430
a. Click on the Kiwi Syslog Daemon Icon on the desktop to bring up the syslog application. The Kiwi Syslog Daemon can be customized or the defaults can be used.
421 - 430
a. From the Setup Page, click on the Event Log Notifications link.
422 - 430
b. Type in the Syslog and SNMP Destination Host IP address. This should be 10.0.P.10 c. Click the Apply button to begin logging events to the Kiwi Syslog.
d. From the Setup Page, click on the Services SNMP link. e. Click on the Enabled radio button to enable SNMP. f. Configure a System location and contact. g. Click the Apply button to begin logging events to the SNMP Trap Watcher.
423 - 430
c.
View the messages in the Kiwi syslog window. The Hostname should match the IP address of the bridge.
e. Configure SNMP on Kiwi Syslog Daemon by checking the Listen for SNMP Traps box. Click the OK button to save the changes. g. Have a wireless user connect to the bridge. h. Have the wireless user disconnect from the bridge. i. View the main logging screen on Kiwi.
424 - 430
j. k.
Notice the SNMP messages contain much more information than the syslog messages. The Hostname should match the IP address of the bridge. When using the Cisco WLAN Solutions engine or other enterprise level SNMP applications, SNMP can be used for monitoring and management.
425 - 430
Objective
In this lab, the student will determine the feasibility of deploying a WLAN at a local school in their area.
Scenario
Connectivity to IT tools is often restricted to IT classrooms or computer labs. However, with the emergence of on-line curriculum and multimedia learning materials, the demand for student access from any part of the campus is growing. Productivity for professors, lecturers, and teachers is no different. A wireless network can enable teachers and students to gain access to information, productivity tools, and applications regardless of their environment or smart devices like laptops, PDAs, BlackBerries, and phones.
426 - 430
427 - 430
Answers will vary. Quantity 3 5 5 1 1 Item # AIR-AP1230A-K9 AIR-PCM352 AIR-CB20A SW-3550-PWR NA Description 1200 Series Access Point 350 Series 802.11b client cards 802.11a client cards 3550 Powered switch Installation Contract Price $1000 $100 $200 $2000 $5000 Total Extension $3000 $500 $1000 $2000 $5000 $11,500
428 - 430
Objective
In this lab, the student will learn about the process of implementing a WLAN in an existing organization.
Scenario
A recent study of WLANs, conducted by NOP World-Technology, studied the perceived benefits of WLANs after implementation. The study found that WLANs increase productivity. End-users stay connected to the network an average of 1.75 hours longer each day, and report average daily time savings of 70 minutes. Overall, WLANs create a productivity increase of 22 percent.
Preparation
The instructor can do some of the preliminary research involved in locating organizations in the area that have implemented or have plans to implement a WLAN.
Step 1
Locate an organization that has implemented a WLAN 1. List the organization name and describe its core service or business: Answers will vary. Example: U.S. Insurance, Inc
Step 2
Coordinate an on site interview with the IT manager a. Who was contacted? Answers will vary. Example: John Doe, CIO (Chief Information Officer) b. What is this persons primary responsibility? Answers will vary. For Example: Manage the corporate information systems and all technology groups including network operations, security operations, and server operations. Responsibilities include long term IT strategy, total cost of ownership, and return on network investments. c. Was a site survey performed? Answers will vary. Example: No. The CIO wants to outsource the survey to a wireless integration company. There are over 50 branch offices in addition to the corporate headquarters which must be surveyed.
429 - 430
d. What prompted the necessity of the WLAN? Answers will vary. Example: The CIO received many requests from various departments and field offices for wireless access. The CIO researched the benefits and productivity increases of a WLAN. e. Describe the organizations wired network prior to adding a WLAN. For example, what routers, switches, workstations, servers, and applications were used? Answers will vary. Example: U.S. Insurance currently runs the corporate HQ with Cisco 6500 Series Switches, and 7000 Series Routers at the headquarters. Each branch site is connected through a Cisco 1721 with at least one 2950XL Catalyst switch. There is one server and 10 PCs at each remote site. The primary applications are customer claims databases, instant messaging, and e-mail. f. List the equipment that was added for the WLAN deployment. Answers will vary. Example: The following equipment will be added for the WLAN deployment. Sixty 1200 series Access Points. One per branch office and 10 for the main corporate site Three inline power Ethernet blades for the 6500s at the main corporate site. Six hundred wireless client adapters. 10 per branch office and 100 for the main corporate site. Cisco Secure Access Control Server Wireless LAN Solution Engine
g. What methods are used to secure access onto the WLAN? Answers will vary. Example: Encryption 128 bit WEP with Cisco TKIP and MIC. Authentication 802.1x (Cisco LEAP) Logging Logging all authentications through Cisco Secure ACS
h. What quantifiable results were achieved? Answers will vary. Example: Users are connected 10 percent longer per day. Claims adjusters with laptops are able to input claims in the field, then easily connect to the claims database once in the office. Adjusters can also access the corporate network through wireless hotspots over a VPN connection.
430 - 430