+ All Categories
Home > Documents > Ccna Discovery 7 8

Ccna Discovery 7 8

Date post: 15-Oct-2014
Category:
Upload: chathuranga-mannage
View: 73 times
Download: 2 times
Share this document with a friend
107
Search | Glossary Course Index: CCNA Discovery - Networking for Home and Small Businesses 7 Wireless Technologies 7.0 Chapter Introduction 7.0.1 Introduction Page 1: 7.0.1 Introduction Single Diagram Diagram 1, Slide show The human network is alive with people interacting while going about their daily lives. We want to stay connected, no matter where we are. Wireless network communication makes this possible. In this chapter, you will learn about wireless networks and how to provide secure wireless connectivity. After completion of this chapter, you should be able to: Describe wireless technology. Describe the various components and structure of a wireless LAN. Describe wireless security issues and migration strategies. Configure an integrated wireless access point and wireless client.
Transcript
Page 1: Ccna Discovery 7 8

Search | Glossary

Course Index:

CCNA Discovery - Networking for Home and Small Businesses

7 Wireless Technologies

7.0 Chapter Introduction

7.0.1 Introduction

Page 1:

7.0.1 IntroductionSingle Diagram

Diagram 1, Slide show

The human network is alive with people interacting while going about their daily lives.

We want to stay connected, no matter where we are. Wireless network communication makes this possible.

In this chapter, you will learn about wireless networks and how to provide secure wireless connectivity.

After completion of this chapter, you should be able to: Describe wireless technology. Describe the various components and structure of a wireless LAN. Describe wireless security issues and migration strategies. Configure an integrated wireless access point and wireless client.

7.1 Wireless Technology

7.1.1 Wireless Technologies and Devices

Page 1:

Page 2: Ccna Discovery 7 8

In addition to the wired network, various technologies exist that allow the transmission of information between hosts without cables. These are known as wireless technologies.

Wireless technologies use electromagnetic waves to carry information between devices. An electromagnetic wave is the same medium that carries radio signals through the air.

The electromagnetic spectrum includes such things as radio and television broadcast bands, visible light, x-rays and gamma-rays. Each of these has a specific range of wavelengths and associated energies as shown in the diagram.

Some types of electromagnetic waves are not suitable for carrying data. Other parts of the spectrum are regulated by governments and licensed to various organizations for specific applications. Certain areas of the spectrum have been set aside to allow public use without the restriction of having to apply for special permits. The most common wavelengths used for public wireless communications include the Infrared and part of the Radio Frequency (RF) band.

7.1.1 Wireless Technologies and DevicesFour Diagrams Diagram 1, Image The diagram depicts the electromagnetic spectrum and its breakdown in terms of wavelengths from high frequency waves (Gamma) to low frequency waves (Radio). The diagram also shows the colors in the narrow visible light spectrum between ultraviolet and Infrared. The major segments of the electromagnetic spectrum are listed below: Gamma Rays: Wavelength = 10 to the minus 14 to 10 to the minus 12 meters. X rays: Wavelength = 10 to the minus 12 to 10 to the minus 10 meters. Ultraviolet Rays: Wavelength = 10 to the minus 10 to 10 to the minus 8 meters. Visible Light: Wavelength = 10 to the minus 8 to 10 to the minus 6 meters (approximately 400 to 800 nanometers). Optical spectrum colors are as follows, from left to right in the diagram: Violet, Blue, Green, Yellow, Orange, and Red. Infrared Rays: Wavelength = 10 to the minus 6 to 10 to the minus 4 meters. Radar: Wavelength = 10 to the minus 4 to 10 to the minus 2 meters. TV and FM Radio: Wavelength = 1 meter. Shortwave: Wavelength = 10 to power of 2 meters. A M Radio: Wavelength = 10 to the power of 4 meters.

Page 2:

Page 3: Ccna Discovery 7 8

Infrared

Infrared (IR) is relatively low energy and cannot penetrate through walls or other obstacles. However, it is commonly used to connect and move data between devices such as Personal Digital Assistants (PDAs) and PCs. A specialized communication port known as an Infrared Direct Access (IrDA) port uses IR to exchange information between devices. IR only allows a one-to-one type of connection.

IR is also used for remote control devices, wireless mice, and wireless keyboards. It is generally used for short-range, line-of-sight, communications. However, it is possible to reflect the IR signal off objects to extend the range. For greater ranges, higher frequencies of electromagnetic waves are required.

7.1.1 Wireless Technologies and DevicesDiagram 2, Image The diagram depicts a wireless handheld device, such as a PDA, that is communicating with a desktop PC. This is achievable by using wireless LAN (W LAN) functionality that is built into the PDA, and a wireless network card that is installed in the desktop PC.

Page 3:

Radio Frequency (RF)

RF waves can penetrate through walls and other obstacles, allowing a much greater range than IR.

Certain areas of the RF bands have been set aside for use by unlicensed devices such as wireless LANs, cordless phones and computer peripherals. This includes the 900 MHz, 2.4 GHz, and the 5 GHz frequency ranges. These ranges are known as the Industrial Scientific and Medical (ISM) bands and can be used with very few restrictions.

Bluetooth is a technology that makes use of the 2.4 GHz band. It is limited to low-speed, short-range communications, but has the advantage of communicating with many devices at the same

Page 4: Ccna Discovery 7 8

time. This one-to-many communications has made Bluetooth technology the preferred method over IR for connecting computer peripherals such as mice, keyboards and printers.

Other technologies that make use of the 2.4 GHz and 5 GHz bands are the modern wireless LAN technologies that conform to the various IEEE 802.11 standards. They are unlike Bluetooth technology in that they transmit at a much higher power level, which gives them a greater range.

7.1.1 Wireless Technologies and DevicesDiagram 3, Image The diagram depicts a range of frequencies, from extremely low, such as audio, to extremely high, such as X Rays. The RF (Radio Frequency) spectrum that is used for wireless communication ranges from Medium to Super High, and also includes infrared in the light spectrum. The RF bands that have been set aside for use with cordless phones and wireless LANs are described in the text. Their place in the overall spectrum is in the Ultra High to Super High RF range. The names and relative sizes of the frequency ranges are depicted as boxes from left, audio, to right, X Rays. The diagram identifies the frequency point on the range for the following communication technologies: Audio Extremely, Very Low, Low A M Broadcast Medium to High Shortwave Radio Medium FM Broadcast Very High Television Very High to Ultra High Cellular (840 MHz) Ultra High Cordless Phones (902 to 928 MHz) Ultra High NPCS (930 MHz) Ultra High IEEE 802.11b/g/n Wireless LANs (2.400 to 2.483 GHz) IEEE 802.11a and HiperLAN/2 Wireless LANs (5.725 to 5.850 GHz) Infrared Wireless LAN Infrared spectrum Visible Light, Ultraviolet, and X ray light are at the right end of the spectrum.

Page 4:

7.1.1 Wireless Technologies and DevicesDiagram 4, Activity The diagram depicts an activity in which you must indicate which wireless network technology scenario is associated with IR, RF, or Blue tooth. Scenarios One.Zoe checks her email at the airport. Two.Sheldon wears his earpiece so he can talk hands-free on his cell phone.

Page 5: Ccna Discovery 7 8

Three.George and Cleo sit side by side at the park playing Internet chess on their PDA's. Four.Suzanne's CD player is upstairs in her bedroom. She wears her cordless headphones to listen to music three floors down in the basement. Five.Frederik buys three new wireless devices to attach to his desktop computer at home. Six.Dominic changes the channel on his TV with a remote. Seven.Helen's new cordless phone uses the 5.8 GHz range.

7.1.2 Benefits and Limitations of Wireless Technology

Page 1:

Wireless technology offers many advantages compared to traditional wired networks.

One of the main advantages is the ability to provide anytime, anywhere connectivity. The widespread implementation of wireless in public locations, known as hotspots, allows people to easily connect to the Internet to download information and exchange emails and files.

Wireless technology is fairly easy and inexpensive to install. The cost of home and business wireless devices continues to decrease. Yet, despite the decrease in cost, the data rate and capabilities of these devices have increased, allowing faster, more reliable wireless connections.

Wireless technology enables networks to be easily expanded, without the limitations of cabled connections. New and visiting users can join the network quickly and easily.

7.1.2 Benefits and Limitations of Wireless TechnologyTwo Diagrams Diagram 1, Interactive The diagram depicts four desktop computers communicating wirelessly with a Linksys WRT300N Router AP. The router AP is directly connected to the Internet cloud. An information window lists the following benefits of wireless technology: Mobility Allows for easy connection of both stationary and mobile clients. Scalability Can be easily expanded to allow more users to connect and to increase the coverage area. Flexibility Provides anytime, anywhere connectivity. Cost savings Equipment costs continue to fall as the technology matures. Reduced installation time Installation of a single piece of equipment can provide connectivity for

Page 6: Ccna Discovery 7 8

a large number of people. Reliability in harsh environments Easy to install in emergency and hostile environments.

Page 2:

Despite the flexibility and benefits of wireless, there are some limitations and risks.

First, Wireless LAN (WLAN) technologies make use of the unlicensed regions of the RF spectrum. Since these regions are unregulated, many different devices make use of them. As a result, these regions are congested and signals from different devices often interfere with each other. In addition, many devices such as microwave ovens and cordless phones use these frequencies and can interfere with WLAN communications.

Second, a major concern with wireless is security. Wireless provides ease of access. It does this by broadcasting data in a manner that allows anyone the ability to access it. However, this same feature also limits the amount of protection wireless can provide for the data. It allows anyone to intercept the communication stream, even unintended recipients. To address these security concerns, techniques have been developed to help secure wireless transmissions including encryption and authentication.

7.1.2 Benefits and Limitations of Wireless TechnologyDiagram 2, Interactive The diagram depicts three people, separately working on their desktop PC's. They are wirelessly connected to the network through wireless network cards that are installed in their machines. The Linksys WRT300N Router AP acts as the centralized communication point for the three people to transfer information and communicate with each other. An information window lists the following limitations of wireless technology: Interference Wireless technology is susceptible to interference from other devices that produce electromagnetic energies. This includes cordless phones, microwaves, televisions, and other wireless LAN implementations. Network and data security Wireless LAN technology is designed to provide access to the data being transmitted, not security of the data. Additionally, it can provide an unprotected entrance into the wired network. Technology Wireless LAN technology continues to evolve. Wireless LAN technology does not currently provide the speed or reliability of wired LAN's.

7.1.3 Types of Wireless Networks and Their Boundaries

Page 1:

Page 7: Ccna Discovery 7 8

Wireless networks are grouped into three major categories: Wireless Personal Area networks (WPAN), Wireless Local Area networks (WLAN), and Wireless Wide Area networks (WWAN).

Despite these distinct categories, it is difficult to place boundary limitations on a wireless implementation. This is because, unlike a wired network, wireless networks do not have precisely defined boundaries. The range of wireless transmissions can vary due to many factors. Wireless networks are susceptible to outside sources of interference, both natural and man-made. Fluctuations in temperature and humidity can greatly alter the coverage of wireless networks. Obstacles within the wireless environment can also affect the range.

7.1.3 Types of Wireless Networks and there BoundariesThree Diagrams Diagram 1, Image The diagram depicts three ovals, encapsulated within each other. They are getting smaller as they progress toward the center. The first oval has the title W WAN, or Wireless Wide Area Network. The next oval encompasses the W LAN, or Wireless Local Area Network. The inner most oval encompasses the W PAN, or Wireless Personal Area Network. The diagram illustrates the relative coverage of each type of network.

Page 2:

WPAN

This is the smallest wireless network used to connect various peripheral devices such as mice, keyboards and PDAs to a computer. All of these devices are dedicated to a single host with usually use IR or Bluetooth technology.

WLAN

WLAN is typically used to extend the boundaries of the local wired network (LAN). WLANs use RF technology and conform to the IEEE 802.11 standards. They allow many users to connect to a wired network through a device known as an Access Point (AP). An Access Point provides a connection between wireless hosts and hosts on an Ethernet wired network.

Page 8: Ccna Discovery 7 8

WWAN

WWAN networks provide coverage over extremely large areas. A good example of a WWAN is the cell phone network. These networks use technologies such as Code Division Multiple Access (CDMA) or Global System for Mobile Communication (GSM) and are often regulated by government agencies.

7.1.3 Types of Wireless Networks and there BoundariesDiagram 2, Table The diagram depicts a table of the different types of wireless networks. Listed for each of networks are the fields: Standard, Speed, Range, and Application. W PAN Standards: Blue tooth v2.0+ EDR** Speed: < 3 Mbps Range: Short Applications: Peer to Peer, device to device ** The acronym, EDR, is Enhanced Data Rate. W LAN Standards: IEEE 8 0 2 dot 11 a/b/g/n HiperLAN and HiperLAN/2 Speed: 1 to 540 Mbps Range: Medium Applications: Home, small business, and enterprise networks W WAN Standards: GSM, GPRS, CDMA Speed: 10 to 384Kbps Range: Long Applications: PDA, mobile phones, and cellular access

Speed and range are constantly increasing with newer technologies.

Page 3:

7.1.3 Types of Wireless Networks and there BoundariesDiagram 3, Activity The diagram depicts an activity in which you must classify whether each scenario is a W PAN, W LAN, or W WAN. Scenarios One.Charlene uses the I rDA port to connect her PDA to her laptop to upload files. Two.Natasha calls her friend Carlos on her cell phone. Three.Trishna uses her laptop computer at a wireless HotSpot to check her email. Four.Burt uses a wireless Blue tooth headset to listen to music from his MP3 player.

Page 9: Ccna Discovery 7 8

Five.Jim connects to the wireless network at his school to do research on a new technology. Six.Ragu uses his cell phone to view a web page on the Internet.

7.2 Wireless LANs

7.2.1 Wireless LAN Standards

Page 1:

A number of standards have been developed to ensure that wireless devices can communicate. They specify the RF spectrum used, data rates, how the information is transmitted, and more. The main organization responsible for the creation of wireless technical standards is the IEEE.

The IEEE 802.11 standard governs the WLAN environment. There are four amendments to the IEEE 802.11 standard that describe different characteristics for wireless communications. The currently available amendments are 802.11a, 802.11b, 802.11g and 802.11n (802.11n is not ratified at the time of this writing). Collectively these technologies are referred to as Wi-Fi, Wireless Fidelity.

Another organization, known as the Wi-Fi Alliance, is responsible for testing wireless LAN devices from different manufacturers. The Wi-Fi logo on a device means that this equipment meets standards and should interoperate with other devices of the same standard.

7.2.1 Wireless LAN StandardsTwo Diagrams

Diagram 1, Image

The diagram depicts a Linksys WRT300N Router that is connected to a PC via WiFi connection.

Page 2:

802.11a:

Uses 5 GHz RF spectrum Not compatible with 2.4 GHz spectrum, i.e. 802.11 b/g/n devices Range is approximately 33% that of the 802.11 b/g Relatively expensive to implement compared to other technologies

Page 10: Ccna Discovery 7 8

Increasingly difficult to find 802.11a compliant equipment

802.11b:

First of the 2.4 GHz technologies Maximum data-rate of 11 Mbps Range of approximately 46 m (150 ft) indoors/96 m (300 ft) outdoors

802.11g:

2.4 GHz technologies Maximum data-rate increase to 54 Mbps Same range as the 802.11b Backwards compatible with 802.11b

802.11n:

Newest standard in development 2.4 GHz technologies (draft standard specifies support for 5 GHz) Extends the range and data throughput Backwards compatible with existing 802.11g and 802.11b equipment (draft standard

specifies 802.11a support)

7.2.1 Wireless LAN StandardsDiagram 2, Table

The diagram depicts common IEEE W LAN standards, as follows:

Standard 8 0 2 dot 11 Release Date July 1997 Frequency 2.4 GHz Data Rate (Max) 2 Mbps Maximum Range* undefined

Standard 8 0 2 dot 11a Release Date October 1999 Frequency 5 GHz Data Rate (Max) 54 Mbps Maximum Range* 50 m

Standard 8 0 2 dot 11b Release Date October 1999 Frequency 2.4 GHz Data Rate (Max) 11 Mbps

Page 11: Ccna Discovery 7 8

Maximum Range* 100 m

Standard 8 0 2 dot 11g Release Date June 2003 Frequency 2.4 GHz Data Rate (Max) 54 Mbps Maximum Range* 100 m

Standard **8 0 2 dot 11n Release Date Approved Draft 2.0 March 2007 Frequency 2.4 GHz or 5 GHz Data Rate (Max) 540 Mbps Maximum Range* 250 m

*Maximum Range This value can vary widely. ** The 8 0 2 dot 11n standard is still in draft and values may change.

7.2.2 Wireless LAN Components

Page 1:

Once a standard is adopted, it is important that all components within the WLAN adhere to the standard, or are at least compatible with the standard. There are various components that must be considered in a WLAN including: a wireless client or STA, an Access Point, a Wireless Bridge and an antenna.

7.2.2 Wireless LAN ComponentsThree Diagrams

Diagram 1, Interactive

The diagram depicts different types of wireless networks, including a Wireless Access Point Network and Wireless Bridge Network. Brief description are given for the various networks.

Wireless Access Point Network The Wireless Access point network has a Linksys WRT300N router, which has three clients connected to it via WI FI.

Wireless Bridge Network The Wireless Bridge Network has two wireless bridges connected to one another via WI FI. Each bridge also has four clients attached, which are also connected via WI FI.

Wireless Client Any host device that can participate in a wireless network. Most devices that can be connected to

Page 12: Ccna Discovery 7 8

a traditional wired network can be connected to a W LAN, if equipped with the proper wireless NIC and software. Can either be stationary or mobile. Commonly referred to as S T A, which is short for station. Examples include laptops, PDA's, printers, projectors, and storage devices.

Access Point Controls access between a wired and a wireless network. For example: It allows wireless clients to gain access to a wired network, and vice versa. Acts as a media converter, accepting the Ethernet frames from the wired network and converting them to 8 0 2 dot 11 compliant frames before transmitting them on the W LAN. Accepts 8 0 2 dot 11 frames from the W LAN and converts them into Ethernet frames before placing them onto the wired network. AP's support wireless connections within a limited area, known as a cell, or Basic Service Set (BSS).

Wireless Bridge Used to connect two wired networks through a wireless link. Allows long range, point to point connections between networks. Using the unlicensed RF frequencies, networks 25 miles (40 km) or more apart can be connected without the use of wires.

Page 2:

Antennas:

Used on APs and Wireless bridges Increases the output signal strength from a wireless device Receives wireless signals from other devices such as STAs Increase in signal strength from an antenna is known as the gain Higher gains usually translate into increased transmission distances

Antennas are classified according to the way they radiate the signal. Directional antennas concentrate the signal strength into one direction. Omni-directional antennas are designed to emit equally in all directions.

By concentrating all of the signal into one direction, directional antennas can achieve great transmission distances. Directional antennas are normally used in bridging applications while omni-directional antennas are found on APs.

7.2.2 Wireless LAN ComponentsDiagram 2, Image

Page 13: Ccna Discovery 7 8

The diagram depicts a Linksys WRT300N Router that has omni directional antennas, located on top, and a wireless activity light, located on front panel.

Page 3:

7.2.2 Wireless LAN ComponentsDiagram 3, Activity

The diagram depicts an activity in which you must match one of the W LAN components to a characteristic.

W LAN Components Bridge AP Antenna Client

One.Also known as an S T A. Two.Converts Ethernet Frame type to 8 0 2 dot 11 format. Three.Increases the strength of the wireless signal. Four.A mobile device that can participate in the wireless LAN. Five.Allows long range wireless communication. Six.Controls access by wireless clients into the wired LAN. Seven.Receives the wireless signal from an S T A.

7.2.3 WLANs and the SSID

Page 1:

When building a wireless network, it is important that the wireless components connect to the appropriate WLAN. This is done using a Service Set Identifier (SSID).

The SSID is a case-sensitive, alpha-numeric string that is up to 32-characters. It is sent in the header of all frames transmitted over the WLAN. The SSID is used to tell wireless devices which WLAN they belong to and with which other devices they can communicate.

Regardless of the type of WLAN installation, all wireless devices in a WLAN must be configured with the same SSID in order to communicate.

Page 14: Ccna Discovery 7 8

7.2.3 W LAN's and the SSIDFour Diagrams

Diagram 1, Image

The diagram depicts a circle, labeled Wireless Cell. Inside the circle are four wireless clients and an access point.

Page 2:

There are two basic forms of WLAN installations: Ad-hoc and infrastructure mode.

Ad-hoc

The simplest form of a wireless network is created by connecting two or more wireless clients together in a peer-to-peer network. A wireless network established in this manner is known as an ad-hoc network and does not include an AP. All clients within an ad-hoc network are equal. The area covered by this network is known as an Independent Basic Service Set (IBSS). A simple ad-hoc network can be used to exchange files and information between devices without the expense and complexity of purchasing and configuring an AP.

Infrastructure Mode

Although an ad-hoc arrangement may be good for small networks, larger networks require a single device that controls communications in the wireless cell. If present, an AP will take over this role and control who can talk and when. This is known as infrastructure mode and is the mode of wireless communication most often used in the home and business environment. In this form of WLAN, individual STAs can not communicate directly with each other. To communicate, each device must obtain permission from the AP. The AP controls all communications and ensures that all STAs have equal access to the medium. The area covered by a single AP is known as a Basic Service Set (BSS) or cell.

7.2.3 W LAN's and the SSIDDiagram 2, Image

Page 15: Ccna Discovery 7 8

The diagram depicts two circles: Basic Service Set (BSS), and Independent Basic Service Set (I BSS). Inside the circles are wireless clients. The circle on the right, I BSS, has one access point, with four wireless clients (S T A) connected via WI FI, using Channel 6 on the AP. The circle on the left, BSS, has four wireless clients, and no AP.

Page 3:

The Basic Service Set (BSS) is the smallest building block of a WLAN. The area of coverage of a single AP is limited. To expand the coverage area, it is possible to connect multiple BSSs through a Distribution System (DS). This forms an Extended Service Set (ESS). An ESS uses multiple APs. Each AP is in a separate BSS.

In order to allow movement between the cells without the loss of signal, BSSs must overlap by approximately 10%. This allows the client to connect to the second AP before disconnecting from the first AP.

Most home and small business environments consist of a single BSS. However, as the required coverage area and number hosts needing to connect increases it becomes necessary to create an ESS.

7.2.3 W LAN's and the SSIDDiagram 3, Image

The diagram depicts two overlapping circles (wireless cells). The first (left) circle contains two laptops (S T A), one server and an Access Point all connected via WI FI. The second (right) circle contains three laptops (S T A) and an access point all connected via WI FI. The two Access points from the first and second circles are connected via a wired LAN Backbone link (Distribution System).

Page 4:

Activity

Set the SSID on an AP using the GUI interface.

Page 16: Ccna Discovery 7 8

Click the icon to begin.

7.2.3 W LAN's and the SSIDDiagram 4, Activity

Link to Linksys G U I: Setting the SSID

7.2.4 Wireless Channels

Page 1:

Regardless if the wireless clients are communicating within an IBSS, BSS or ESS the conversation between sender and receiver must be controlled. One way this is accomplished is through the use of Channels.

Channels are created by dividing up the available RF spectrum. Each channel is capable of carrying a different conversation. This is similar to the way that multiple television channels are transmitted across a single medium. Multiple APs can function in close proximity to one another as long as they use different channels for communication.

Unfortunately it is possible for the frequencies used by some channels to overlap with those used by others. Different conversations must be carried on non-overlapping channels. The number and distribution of channels vary by region and technology. The selection of channel used for a specific conversation can be set manually or automatically, based on factors such as current usage and available throughput.

Normally each wireless conversation makes use of a separate channel. Some of the newer technologies combine the channels to create a single wide channel, which provides more bandwidth and increases the data rate.

7.2.4 Wireless ChannelsThree Diagrams

Diagram 1, Image

Page 17: Ccna Discovery 7 8

The diagram depicts two overlapping circles, representing Wireless Cells. The circles mark the coverage of each cell. The first circle contains two laptops (S T A) and an access point, all connected via WI FI, and operating on channel 1. The second circle contains three laptops (S T A) and an access point, all connected via WI FI, and operating on channel 6. The two access points from the first and second circle are connected via a LAN Backbone wired link (Distribution System).

Page 2:

Within a WLAN, the lack of well-defined boundaries makes it impossible to detect if collisions occur during transmission. Therefore, it is necessary to use an access method on a wireless network that ensures collisions do not occur.

Wireless technology uses an access method called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). CSMA/CA creates a reservation on the channel for use by a specific conversation. While a reservation is in place, no other device may transmit on the channel thus possible collisions are avoided.

How does this reservation process work? If a device requires use of a specific communication channel in a BSS, it must ask permission from the AP. This is known as a Request to Send (RTS). If the channel is available, the AP will respond to the device with a Clear to Send (CTS) message indicating that the device may transmit on the channel. A CTS is broadcast to all devices within the BSS. Therefore, all devices in the BSS know that the requested channel is now in use.

Once the conversation is complete, the device that requested the channel sends another message to the AP known as an Acknowledgement (ACK). The ACK indicates to the AP that the channel can be released. This message is also broadcast to all devices on the WLAN. All devices within the BSS receive the ACK and know that the channel is once again available.

7.2.4 Wireless ChannelsDiagram 2, Animation

The diagram depicts a circle. Inside are three laptops (H1, H2, H3) and an access point, all connected via WI FI. H1 needs to send information to H2. H1 sends a Request to Send (RTS) to the access point. The access point sends out a Clear to Send (CTS) to all. H1 then sends the data

Page 18: Ccna Discovery 7 8

to H2 through the AP. H1 then sends an acknowledgment to the access point (release channel). The access point then sends a message to all stating that the channel is free again.

There are speech bubbles in the diagram, as follows:

H1, "I have information to send to H2. I must ask permission to talk on this channel." AP, "No one else is using this channel. I will grant permission to H1 to use it." H1, "Transmission complete. I must release the channel so that someone else can use it."

Page 3:

Activity

Configure the channels used by an AP using the GUI interface.

Click the icon to begin.

7.2.4 Wireless ChannelsDiagram 3, Activity

Link to Linksys G U I: Setting the Channel

7.2.5 Configuring the Access Point

Page 1:

Once the choice of wireless standard, layout and channel assignment have been made it is time to configure the AP.

Most integrated routers offer both wired and wireless connectivity and serve as the AP in the wireless network. Basic configuration settings such as passwords, IP addresses, and DHCP settings are the same whether the device is being used to connect wired or wireless hosts. Basic configuration tasks, such as changing the default password, should be conducted before the AP is connected to a live network.

Page 19: Ccna Discovery 7 8

When using the wireless functionality of an integrated router, additional configuration parameters are required, such as setting the wireless mode, SSID, and wireless channels to be used.

7.2.5 Configuring the Access PointThree Diagrams

Diagram 1, Image

The diagram depicts the G U I interface of a Linksys WRT300N Wireless device. The Wireless/Basic Wireless Settings tab is selected. The Network Mode drop down box has been opened, and the Mixed option has been highlighted.

Page 2:

Wireless Mode

Most home AP devices can support various modes, mainly 802.11b, 802.11g and 802.11n. Although these all use the 2.4 GHz range, each uses a different technology to obtain its maximum throughput. The type of mode enabled on the AP depends on the type of host connecting to it. If only one type of host connects to the AP device, set the mode to support it. If multiple types of hosts will connect, select mixed mode. Each mode includes a certain amount of overhead. By enabling mixed mode, network performance will decrease due to the overhead incurred in supporting all modes.

SSID

The SSID is used to identify the WLAN. All devices that wish to participate in the WLAN must use the same SSID. To allow easy detection of the WLAN by clients, the SSID is broadcast. It is possible to disable the broadcast feature of the SSID. If the SSID is not broadcast; wireless clients will need to have this value manually configured.

Wireless Channel

Page 20: Ccna Discovery 7 8

The choice of channel for an AP must be made relative to the other wireless networks around it. Adjacent BSSs must use non-overlapping channels in order to optimize throughput. Most APs now offer a choice to manually configure the channel or allow the AP to automatically locate the least congested channel or locate the one that offers maximum throughput.

7.2.5 Configuring the Access PointDiagram 2, Interactive

The diagram depicts the G U I interface of a Linksys Wireless device. The Basic Wireless Settings tab is selected. The Network Mode, Network Name (SSID), Standard Channel, and SSID Broadcast options have been highlighted. Clicking each of these displays a brief description, as follows:

Network Mode Determines the type of technology that must be supported. For example, 8 0 2 dot 11b, 8 0 2 dot 11g or 8 0 2 dot 11n, or mixed mode.

Network Name (SSID) Used to identify the W LAN. All devices that participate in the W LAN must have the same SSID.

Standard Channel Specifies the channel over which communication will occur. By default, this is set to Auto to allow the AP to determine the optimum channel to use.

SSID Broadcast Determines if the SSID will be broadcast to all devices within range. By default, it is set to Enabled.

The following settings are configured settings in this diagram:

Network Mode: Mixed Network Name (SSID): linksys Standard Channel: Auto SSID Broadcast: Enabled

Page 3:

Lab Activity

Configure basic wireless functionality on an AP using the GUI interface.

Click the lab icon to begin.

Page 21: Ccna Discovery 7 8

7.2.5 Configuring the Access PointDiagram 3, Lab Activity

Link to Hands on Lab: Configuring a Wireless Access Point

This lab is available in accessible format through the Cisco website

7.2.6 Configuring the Wireless Client

Page 1:

A wireless host, or STA, is defined as any device that contains a wireless NIC and wireless client software. This client software allows the hardware to participate in the WLAN. Devices that are STAs include: PDAs, laptops, desktop PCs, printers, projectors and Wi-Fi phones.

In order for a STA to connect to the WLAN, the client configuration must match that of the AP. This includes the SSID, security settings, and channel information if the channel was manually set on the AP. These settings are specified in the client software that manages the client connection.

The wireless client software used can be software integrated into the device operating system, or can be a stand-alone, downloadable, wireless utility software specifically designed to interact with the wireless NIC.

7.2.6 Configuring the Wireless ClientFour Diagrams

Diagram 1, Image

The diagram depicts several devices which are capable of accessing wireless networks. The devices displayed include a laptop computer, desktop computer, mobile phone, and PDA.

Page 2:

Integrated Wireless Utility Software

Page 22: Ccna Discovery 7 8

The Windows XP wireless client software is an example of a popular wireless client utility that is included as part of the device OS. This client software is basic management software that can control most wireless client configurations. It is user friendly and offers a simple connection process.

Stand-alone Wireless Utility Software

Wireless utility software, such as that supplied with the wireless NIC, is designed to work with that specific NIC. It usually offers enhanced functionality over Windows XP wireless utility software including feature such as:

Link Information - displays the current strength and quality of a wireless single Profiles - allows configuration options such as channel and SSID to be specified for each

wireless network Site Survey - enables the detection of all wireless networks in the vicinity

It is not possible to allow both the wireless utility software and Windows XP client software to manage the wireless connection at the same time. For most situations Windows XP is sufficient. However, if multiple profiles must be created for each wireless network or advanced configurations settings are necessary, it is better to use the utility supplied with the NIC.

7.2.6 Configuring the Wireless ClientDiagram 2, Image

The diagram depicts the G U I interface of the Linksys Wireless client device. The Link Information tab has been selected, and the Wireless Network Status information is displayed.

Page 3:

Once the client software is configured, verify the link between the client and the AP.

Open the wireless link information screen to display information such as the connection data rate, connection status, and wireless channel used. The Link Information feature, if available, displays the current signal strength and quality of the wireless signal.

Page 23: Ccna Discovery 7 8

In addition to verifying the wireless connection status, verify that data can actually be transmitted. One of the most common tests for verifying successful data transmission is the Ping test. If the ping is successful, data transmission is possible.

If the ping is unsuccessful from source to destination, then ping the AP from the wireless client to ensure that wireless connectivity is available. If this fails as well, the issue is between the wireless client and the AP. Check the setting information and try to reestablish connectivity.

If the wireless client can successfully connect to the AP, then check the connectivity from the AP to the next hop on the path to the destination. If this is successful, then the problem is most likely not with the AP configuration, but may be an issue with another device on the path to the destination or the destination device itself.

7.2.6 Configuring the Wireless ClientDiagram 3, Image

The diagram depicts a wireless network. A Linksys WRT300N Router AP connects four hosts (H1, H2, H3, H4) via WiFi to the Internet. H1 has an X through the wireless connection to the WRT300N Router The router has a speech bubble, which says, "Your configuration is not correct. Access denied."

Page 4:

Lab Activity

Configure a wireless client to connect to the previously configured AP and verify connectivity.

Click the lab icon to begin.

7.2.6 Configuring the Wireless ClientDiagram 4, Lab Activity

Link to Lab Activity: Configuring a Wireless Client

Page 24: Ccna Discovery 7 8

This lab is available in accessible format through the Cisco website

7.3 Security Considerations on A Wireless LAN

7.3.1 Why People Attack WLANs

Page 1:

One of the primary benefits of wireless networking is ease and convenience of connecting devices. Unfortunately that ease of connectivity and the fact that the information is transmitted through the air also makes your network vulnerable to interception and attacks.

With wireless connectivity, the attacker does not need a physical connection to your computer or any of your devices to access your network. It is possible for an attacker to tune into signals from your wireless network, much like tuning into a radio station.

The attacker can access your network from any location your wireless signal reaches. Once they have access to your network, they can use your Internet services for free, as well as access computers on the network to damage files, or steal personal and private information.

These vulnerabilities in wireless networking require special security features and implementation methods to help protect your WLAN from attacks. These include simple steps performed during initial setup of the wireless device, as well as more advanced security configurations.

7.3.1 Why People Attack W LAN'sThree Diagrams

Diagram 1, Image

The diagram depicts houses with wireless networks and sinister looking people hanging around outside with laptops.

More Information Popup War driving/walking/chalking: War driving is the process of driving around an area, searching for wireless LAN's. Once discovered, the location of the W LAN is logged and shared. The goal of war driving is to bring attention to the fact that most wireless networks are insecure, and also

Page 25: Ccna Discovery 7 8

to show the widespread acceptance and use of wireless LAN technology.

A similar process to war driving is known as war walking, where the person walks around an area to discover wireless access. Once access is discovered, a chalk mark is placed in front of the location to indicate the status of the wireless connection.

Page 2:

One easy way to gain entry to a wireless network is through the network name, or SSID.

All computers connecting to the wireless network must know the SSID. By default, wireless routers and access points broadcast SSIDs to all computers within the wireless range. With SSID broadcast activated, any wireless client can detect the network and connect to it, if no other security features are in place.

The SSID broadcast feature can be turned off. When it is turned off, the fact that the network is there is no longer made public. Any computer trying to connect to the network must already know the SSID.

7.3.1 Why People Attack W LAN'sDiagram 2, Image

The diagram depicts the setup screen for a Linksys WRT300N Wireless N broadband router. Under the wireless tab, both the SSID and SSID broadcast are at their default values. This means that the SSID is well known and is being broadcast to anyone within range.

Page 3:

Additionally, it is important to change the default setting. Wireless devices are shipped preconfigured with settings such as SSIDs, passwords, and IP addresses in place. These defaults make it easy for an attacker to identify and infiltrate a network.

Even with SSID broadcasting disabled, it is possible for someone to get into your network using the well-known default SSID. Additionally, if other default settings, such as passwords and IP addresses are not changed, attackers can access an AP and make changes themselves. Default information should be changed to something more secure and unique.

Page 26: Ccna Discovery 7 8

These changes, by themselves, will not protect your network. For example, SSIDs are transmitted in clear text. There are devices that will intercept wireless signals and read clear text messages. Even with SSID broadcast turned off and default values changed, attackers can learn the name of a wireless network through the use of these devices that intercept wireless signals. This information will be used to connect to the network. It takes a combination of several methods to protect your WLAN.

7.3.1 Why People Attack W LAN'sDiagram 3, Animation

In the animation, a sinister looking character, with a laptop, is initially able to access the wireless LAN using the default settings. He becomes vexed once the wireless LAN he is trying to gain access to is no longer using the default SSID or password.

There are speech bubbles in the diagram, as follows:

SSID = Default, Password = Default The intruder, "They have not changed the default settings! I can access it." SSID = Z1nflTm, Password = str8#210 The intruder, "They changed the SSID and password! Defaults will no longer work."

7.3.2 Limiting Access to a WLAN

Page 1:

One way to limit access to your wireless network is to control exactly which devices can gain access to your network. This can be accomplished through filtering of the MAC address.

MAC Address Filtering

MAC address filtering uses the MAC address to identify which devices are allowed to connect to the wireless network. When a wireless client attempts to connect, or associate, with an AP it will send MAC address information. If MAC filtering is enabled, the wireless router or AP will look up its MAC address a preconfigured list. Only devices whose MAC addresses have been prerecorded in the router's database will be allowed to connect.

Page 27: Ccna Discovery 7 8

If the MAC address is not located in the database, the device will not be allowed to connect to or communicate across the wireless network.

There are some issues with this type of security. For example, it requires the MAC addresses of all devices that should have access to the network be included in the database before connection attempts occur. A device that is not identified in the database will not be able to connect. Additionally, it is possible for an attacker's device to clone the MAC address of another device that has access.

7.3.2 Limiting Access to a W LANSingle Diagram

Diagram 1, Image

The diagram depicts a W LAN setup that has the wireless router's MAC address filter list enabled. Only the MAC addresses of the two host computers that are allowed on the network are listed. Any machine with a MAC address that does not appear on the list, cannot gain access, even if they have the password. The third host, with a red X, is not allowed to connect.

7.3.3 Authentication on a WLAN

Page 1:

Another way to control who can connect is to implement authentication. Authentication is the process of permitting entry to a network based on a set of credentials. It is used to verify that the device attempting to connect to the network is trusted.

The use of a username and password is a most common form of authentication. In a wireless environment, authentication still ensures that the connected host is verified, but handles the verification process in a slightly different manner. Authentication, if enabled, must occur before the client is allowed to connect to the WLAN. There are three types of wireless authentication methods: open authentication, PSK and EAP.

Open Authentication

Page 28: Ccna Discovery 7 8

By default, wireless devices do not require authentication. Any and all clients are able to associate regardless of who they are. This is referred to as open authentication. Open authentication should only be used on public wireless networks such as those found in many schools and restaurants. It can also be used on networks where authentication will be done by other means once connected to the network.

7.3.3 Authentication on a W LANThree Diagrams

Diagram 1, Image

In the diagram, a laptop attempts to connect to a wireless router that is using Open Authentication. There are speech bubbles in the diagram, as follows:

Laptop asks, "Hi I know your name, Can I connect?" Wireless router replies, "Sure Access granted."

Page 2:

Pre-shared keys (PSK)

With PSK both the AP and client must be configured with the same key or secret word. The AP sends a random string of bytes to the client. The client accepts the string, encrypts it (or scrambles it) based on the key, and sends it back to the AP. The AP gets the encrypted string and uses its key to decrypt (or unscramble) it. If the decrypted string received from the client matches the original string sent to the client, the client is allowed to connect.

PSK performs one-way authentication, that is, the host authenticates to the AP. PSK does not authenticate the AP to the host, nor does it authenticate the actual user of the host.

Extensible Authentication Protocol (EAP)

EAP provides mutual, or two-way, authentication as well as user authentication. When EAP software is installed on the client, the client communicates with a backend authentication server such as Remote Authentication Dial-in User Service (RADIUS). This backend server functions

Page 29: Ccna Discovery 7 8

separately from the AP and maintains a database of valid users that can access the network. When using EAP, the user, not just the host, must provide a username and password which is checked against the RADIUS database for validity. If valid, the user is authenticated.

7.3.3 Authentication on a W LANDiagram 2, Interactive

The diagram depicts two types of authentications, PSK and E AP. There are speech bubbles in the diagram, as follows:

Pre-shared Keys (PSK) A woman at a workstation connects to a wireless router, "Hi, I'd like to connect." The router replies, "You can connect, but only if you know the secret key."

Extensible Authentication Protocol (E AP) A woman at a workstation attempts to connect to a wireless router, Router A. "Hi I'm user XYZ. Password, Cisco. I'd like to connect." The wireless router replies, "I'll forward your request." The radius server gets the request and replies, "User, XYZ, password, Cisco, connect to Router A is verified."

Page 3:

Once authentication is enabled, regardless of the method used, the client must successfully pass authentication before it can associate with the AP. If both authentication and MAC address filtering are enabled, authentication occurs first.

Once authentication is successful, the AP will then check the MAC address against the MAC address table. Once verified, the AP adds the host MAC address into its host table. The client is then said to be associated with the AP and can connect to the network.

7.3.3 Authentication on a W LANDiagram 3, Animation

The diagram depicts a host attempting to connect to an access point (AP). There are speech bubbles in the diagram, as follows:

The host attempts to connect, "Hi I would like to connect." The AP challenges (request for key), "Only if you know the secret key." The host responds to the challenge, "I sent you the string encrypted with the secret key."

Page 30: Ccna Discovery 7 8

The AP authenticates, "I got the string. You are authenticated." The host attempts to associate, "Great. Here is my MAC address so you can associate with me." The AP checks the MAC filter and associates, "Hi, I have checked my filter list. The MAC address is verified. You can connect."

7.3.4 Encryption on a WLAN

Page 1:

Authentication and MAC filtering may stop an attacker from connecting to a wireless network but it will not prevent them from being able to intercept transmitted data. Since there are no distinct boundaries on a wireless network, and all traffic is transmitted through the air, it is easy for an attacker to intercept, or sniff the wireless frames. Encryption is the process of transforming data so that even if it is intercepted it is unusable.

Wired Equivalency Protocol (WEP)

Wired Equivalency Protocol (WEP) is an advanced security feature that encrypts network traffic as it travels through the air. WEP uses pre-configured keys to encrypt and decrypt data.

A WEP key is entered as a string of numbers and letters and is generally 64 bits or 128 bits long. In some cases, WEP supports 256 bit keys as well. To simplify creating and entering these keys, many devices include a Passphrase option. The passphrase is an easy way to remember the word or phrase used to automatically generate a key.

In order for WEP to function, the AP, as well as every wireless device allowed to access the network must have the same WEP key entered. Without this key, devices will not be able to understand the wireless transmissions.

7.3.4 Encryption on a W LANThree Diagrams

Diagram 1, Animation

The diagram depicts a wireless router connecting to a laptop wirelessly. The wireless running

Page 31: Ccna Discovery 7 8

router is running WEP. It is configured with an encrypted key that the laptop must also have to gain access to the AP. Both devices must have the same key.

Page 2:

WEP is a great way to prevent attackers from intercepting data. However, there are weaknesses within WEP, including the use of a static key on all WEP enabled devices. There are applications available to attackers that can be used to discover the WEP key. These applications are readily available on the Internet. Once the attacker has extracted the key, they have complete access to all transmitted information.

One way to overcome this vulnerability is to change the key frequently. Another way is to use a more advanced and secure form of encryption known as Wi-Fi Protected Access (WPA).

Wi-Fi Protected Access (WPA)

WPA also uses encryption keys from 64 bits up to 256 bits. However, WPA, unlike WEP, generates new, dynamic keys each time a client establishes a connection with the AP. For this reason, WPA is considered more secure than WEP because it is significantly more difficult to crack.

7.3.4 Encryption on a W LANDiagram 2, Animation

A sinister character with a laptop with a wireless sniffer is running a WEP cracking tool, picks up packets from a WEP encrypted network. It uses the cracking tool to decode the encryption to then gain access to the network.

Page 3:

Activity

Configure encryption using the Linksys GUI interface.

Page 32: Ccna Discovery 7 8

Click the icon to begin.

7.3.4 Encryption on a W LANDiagram 3, Activity

Link to Linksys G U I: Configuring Encryption

7.3.5 Traffic Filtering on a WLAN

Page 1:

In addition to controlling who can gain access to the WLAN and who can make use of transmitted data, it is also worthwhile to control the types of traffic transmitted across a WLAN. This is accomplished using traffic filtering.

Traffic filtering blocks undesirable traffic from entering or leaving the wireless network. Filtering is done by the AP as traffic passes through it. It can be used to remove traffic from, or destined to, a specific MAC or IP address. It can also block certain applications by port numbers. By removing unwanted, undesirable and suspicious traffic from the network, more bandwidth is devoted to the movement of important traffic and improves the performance of the WLAN. For example, traffic filtering can be used to block all telnet traffic destined for a specific machine, such as an authentication server. Any attempts to telnet into the authentication server would be considered suspicious and blocked.

7.3.5 Traffic Filtering on a W LANTwo Diagrams

Diagram 1, Image

The diagram depicts the G U I screen for a Linksys WRT300N wireless N broadband router. The Wireless tab, Wireless MAC Filter option shows the MAC filter list and its associated settings.

Page 2:

Lab Activity

Page 33: Ccna Discovery 7 8

Configure security on an AP using the GUI interface. Configure the client to connect to the secured AP.

Click the lab icon to begin.

7.3.5 Traffic Filtering on a W LANDiagram 2, Lab Activity

Link to Lab Activity: Configuring Wireless Security

This lab is available in accessible format through the Cisco website

7.4 Configuring an Integrated AP and Wireless Client

7.4.1 Planning the WLAN

Page 1:

When implementing a wireless network solution, it is important to plan before performing any installation. This includes:

Determining the type of wireless standard to use Determining the most efficient layout of devices An installation and security plan A strategy for backing up and updating the firmware of the wireless devices

Wireless Standard

It is necessary to consider several factors when determining which WLAN standard to use. The most common factors include: bandwidth requirements, coverage areas, existing implementations, and cost. This information is gathered by determining end-user requirements.

The best way to learn end-user requirements is to ask questions.

What throughput is actually required by the applications running on the network? How many users will access the WLAN? What is the necessary coverage area?

Page 34: Ccna Discovery 7 8

What is the existing network structure? What is the budget?

7.4.1 Planning the W LANThree Diagrams

Diagram 1, Image

The diagram depicts a Wireless/Wired Network. A Linksys WRT300N Router connects eight hosts. Four hosts are connected via the WI FI. Four hosts are cabled into the switch ports on the router.

Page 2:

The bandwidth available in a BSS must be shared between all the users in that BSS. Even if the applications do not require a high-speed connection, one of the higher-speed technologies may be necessary if multiple users are connecting at the same time.

Different standards support different coverage areas. The 2.4 GHz signal, used in 802.11 b/g/n technologies, travels a greater distance than does the 5 GHz signal, used in 802.11a technologies. Thus 802.11 b/g/n supports a larger BSS. This translates into less equipment and a lower cost of implementation.

The existing network also affects new implementation of WLAN standards. For example, the 802.11n standard is backward compatible with 802.11g and 802.11b but not with 802.11a. If the existing network infrastructure and equipment support 802.11a, new implementations must also support the same standard.

Cost is also a factor. When considering cost, consider Total Cost of Ownership (TCO) which includes the purchase of the equipment as well as installation and support costs. In a medium to large business environment, TCO has a greater impact on the WLAN standard chosen than in the home or small business environment. This is because in the medium to large business, more equipment is necessary and installation plans are required, increasing cost.

7.4.1 Planning the W LANDiagram 2, Image

Page 35: Ccna Discovery 7 8

The diagram depicts four people working on a network plan for a building.

Page 3:

Installation of Wireless Devices

For home or small business environments, the installation usually consists of a limited amount of equipment which can be easily relocated to provide optimum coverage and throughput.

In the enterprise environment, equipment cannot be easily relocated and coverage must be complete. It is important to determine the optimum number and location of APs to provide this coverage at the least amount of cost.

In order to accomplish this, a site survey is usually conducted. The person responsible for the site survey must be knowledgeable in WLAN design and equipped with sophisticated equipment for measuring signal strengths and interference. Depending on the size of the WLAN implementation, this can be a very expensive process. For small installations a simple site survey is usually conducted by simply using wireless STAs and the utility programs packaged with most wireless NICs.

In all cases, it is necessary to consider known sources of interference such as high-voltage wires, motors, and other wireless devices when determining the placement of WLAN equipment.

7.4.1 Planning the W LANDiagram 3, Animation

The diagram depicts the floor plan of an office. There are four separate rooms, each with a person using a wireless laptop. There is also a person that is not in an office, using a wireless laptop. They are checking signal strength and conducting a simple site survey, using a wireless S T A and the NIC utility programs.

7.4.2 Installing and Securing the AP

Page 36: Ccna Discovery 7 8

Page 1:

Once the best technology and placement of the AP is determined, install the WLAN device and configure the AP with security measure. Security measures should be planned and configured before connecting the AP to the network or ISP.

Some of the more basic security measures include:

Change default values for the SSID, usernames and passwords Disable broadcast SSID Configure MAC Address Filtering

Some of the more advanced security measures include:

Configure encryption using WEP or WPA Configure authentication Configure traffic filtering

Keep in mind that no single security measure will keep your wireless network completely secure. Combining multiple techniques will strengthen the integrity of your security plan.

When configuring the clients, it is essential that the SSID matches the SSID configured on the AP. Additionally, encryption keys and authentication keys must also match.

7.4.2 Installing and Securing the APSingle Diagram

Diagram 1, Image

The diagram depicts a Linksys WRT300N Router and a checklist of configuration items that should be completed when installing and securing the AP. The configuration checklist includes the following:

Modify Default Values Disable Broadcast SSID Authentication Traffic Filtering MAC Address Filtering Encryption

Page 37: Ccna Discovery 7 8

7.4.3 Backing-up and Restoring Configuration Files

Page 1:

Configuration Backups

Once the wireless network is properly configured and traffic is moving, a full configuration backup should be performed on wireless devices. This is especially important if a great deal of customization is done to the configuration.

With most integrated routers designed for the home and small business markets, this is simply a matter of selecting the Backup Configurations option from the appropriate menu and specifying the location where the file should be saved. The integrated router provides a default name for the configuration file. This file name can be changed.

The restore process is just as simple. Select the Restore Configurations option. Then, simply browse to the location where the configuration file was previously saved and select the file. Once the file is selected, click Start to Restore to load the configuration file.

Sometimes it may be necessary to return the setting to the factory default conditions. To accomplish this select either the Restore Factory Defaults option from the appropriate menu or press and hold the RESET button located for 30 seconds. The latter technique is especially useful if you are unable to connect to the AP of the integrated router through the network but have physical access to the device.

7.4.3 Backing up and Restoring Configuration FilesTwo Diagrams

Diagram 1, Image

The diagram depicts the G U I interface of a Linksys Wireless Device, showing two buttons: Backup Configurations and Restore Configurations.

Page 38: Ccna Discovery 7 8

Page 2:

Activity

Backup and restore the configurations using the Linksys GUI.

Click the icon to begin.

7.4.3 Backing up and Restoring Configuration FilesDiagram 2, Activity

Link to Linksys G U I: Backing up and Restoring a Configuration File

7.4.4 Updating the Firmware

Page 1:

Updating the Firmware

The operating system on most integrated routers is stored in firmware. As new features are developed or problems with the existing firmware are discovered, it may become necessary to update the firmware on the device.

The process for updating firmware on an integrated router, such as the Linksys wireless router, is simple. However, it is important that once the process is started, it is not interrupted. If the update process is interrupted before completion, the device may be rendered non-operable.

Determine the version of the firmware currently installed on the device. This information is usually displayed on the configuration screen or the connection status screen. Next, search the manufacturer's web site and related news groups on the Internet to discover the firmware feature set, issues that may warrant an upgrade, and whether updates are available.

Page 39: Ccna Discovery 7 8

Download the updated version of the firmware and store it on the hard drive of a device that can be directly connected to the integrated router. It is better if the machine is directly connected to the integrated router with a cable to prevent any interruption in the update process caused by a wireless connection.

Select the Firmware Upgrade feature in the GUI. Browse to the appropriate file on the directly connected device and start the upgrade.

7.4.4 Updating the FirmwareTwo Diagrams

Diagram 1, Image

The diagram depicts the G U I of a Linksys WRT300N. The Administration and Firmware Upgrade tab has been selected.

The text in red reads, "Warning: Upgrading firmware may take a few minutes. Please don't turn off the power or press the reset button. Upgrade must NOT be interrupted!"

Page 2:

Activity

Update the Access Point with a new version of the firmware.

Click the icon to begin.

7.4.4 Updating the FirmwareDiagram 2, Activity

Link to Linksys G U I: Updating the Firmware

Page 40: Ccna Discovery 7 8

7.5 Chapter Summary

7.5.1 Summary

Page 1:

7.5.1 SummaryFour Diagrams, Slider Graphic Diagram 1, Image The diagram depicts the electromagnetic spectrum. Diagram 1 text This chapter described various technologies for the transmission of information between hosts without cables. This chapter also describes the benefits and limitations of these wireless technologies and the devices that use them.

Wireless technologies use electromagnetic radiation in the form of radio signals to carry information between devices. The most common wavelengths used for public wireless communications include the Infrared and part of the Radio Frequency (RF) band. Remote control devices, wireless mice, and wireless keyboards use either Infrared (IR) or Blue tooth technology. Devices such as microwave ovens and cordless phones can interfere with W LAN communications, because they use similar frequencies. Wireless networks are grouped into three major categories: wireless personal area networks (W PAN), wireless local area networks (W LAN), and wireless wide area networks (W WAN). The main organization responsible for the creation of wireless technical standards is the IEEE. Standards that govern the WLAN environment include: 8 0 2 dot 11A, 8 0 2 dot 11B, 8 0 2 dot 11G, 8 0 2 dot 11N. They are known as WiFi standards.

Diagram 2, Image The diagram depicts wireless cells connected by a distribution system. Diagram 2 text Devices in a W LAN include: wireless clients, access points, wireless bridges, and antennas. A small W LAN, peer to peer network, is known as an ad hoc network and does not include an AP. Wireless devices use antennas to transmit and receive information. There are two types of antennas: directional and omni directional. All wireless devices in a W LAN must be configured with the same SSID and operate using the same standards in order to communicate. To separate conversations, the RF spectrum is divided into different channels. APs and clients use an access method called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) that creates a reservation on the channel for use by a specific conversation.

Diagram 3, Image

Page 41: Ccna Discovery 7 8

The diagram depicts wireless security measures. Diagram 3 text Because they can operate without much configuration and transmit information through the air, wireless networks are more susceptible to attacks than wired networks. An attacker can access your network from any location your wireless signal reaches. Attackers can use your Internet services for free, or damage files and steal private information from your network. Some of the more basic security measures that should be taken include the following: Change default values for the SSID, usernames, and passwords. Disable broadcast SSID. Configure MAC Address Filtering.

Some of the more advanced security measures that should be included in your plan would include the following: Configure encryption using WEP or WPA. Configure authentication. Configure traffic filtering. Diagram 4, Image The diagram depicts people planning and using wireless networks. Diagram 4 text Before installing a wireless network, an installation plan should be created that includes the standards to be used, the locations of devices, a security plan, and a strategy for backing up configurations. In order to carry out this plan, the following steps are needed:

Gather user requirements to determine the appropriate standard to use, bandwidth requirements, coverage areas, existing implementations, and cost. Perform a site survey to determine the optimum number and location of AP's. Combine multiple security techniques to strengthen the integrity of the wireless network. Perform a full configuration backup of wireless devices to provide a stored copy in case of device failure. Upgrade firmware, if necessary, to take advantage of enhancements to the operating system.

7.6 Chapter Quiz

7.6.1 Quiz

Page 1:

Take the chapter quiz to check your knowledge.

Click the quiz icon to begin.

Page 42: Ccna Discovery 7 8

7.6.1 Quiz12 Questions

1. Why is IEEE 8 0 2 dot 11 wireless technology able to transmit further distances than Bluetooth technology? Transmits at much lower frequencies Has higher power output Transmits at much higher frequencies Uses better encryption methods

2. What are three advantages of wireless over wired LAN technology? (Choose three) Lower ongoing costs Longer transmission distance Ease of installation Easily expandable Higher level of security Cheaper host adapters

3. In which scenario would wireless security be most important? Your wireless mouse uses the I rDA port on your desktop PC. The local coffee shop provides free internet access as a wireless hotspot. A real estate agent sends information on the sale of a house through a cell phone. Two users create a wireless peer to peer network in order to share a music file.

4. Which wireless technology standard provides the most compatibility with older wireless standards, but has greater performance? 8 0 2 dot 11a 8 0 2 dot 11b 8 0 2 dot 11g 8 0 2 dot 11n

5. Match the characteristic to the W LAN component. Each component has two characteristics. Characteristic: Allows long range point to point connections between networks Acts as a media converter Participates as a host device in a wireless network Connects two wireless network as a wireless link Controls access between a wired and wireless network Referred to as a S T A

Component: Wireless Client Access Point Wireless Bridge

6. Match the characteristic to the installation type.

Page 43: Ccna Discovery 7 8

Characteristic: An AP controls who talks and when Two or more wireless clients in a peer to peer network Individual S T A's do not communicate directly with each other Usually a less expensive network Larger networks require this type of installation Does not include an AP

Installation type: Ad hoc Infrastructure Mode

7. What is CSMA/CA on a network? An access method used by wireless technology to avoid duplicate SSID's. An access method used by any technology that has excess collisions. An access method used by wired Ethernet technology to avoid collisions. An access method used by wireless technology to avoid collisions.

8. Match the statement to the category. There are two statements per category. Statement: A wireless attacker needs physical access to your network in order to launch an attack. As wireless hacker within radio range of any access point could launch an attack. If someone you don't know gains access to your wireless network, they can use your internet connection. The purpose of war chalking is to attack a wireless network and deny access to the internet to the wireless network owner.

Category: True False

9. What statement is true about authentication using pre shared keys when E AP is enabled? Use a key to encrypt an random string of bytes sent by a AP. Requires a backend authentication server such as RADIUS. Performs one way authentication only. Allows clients to associate based on MAC address.

10. When is a client considered to be "authenticated" when only MAC address filtering is enabled on the access point? When the client gives the access point the correct secret key. When the client sends the MAC address to the access point. When the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client. When the access point sends the MAC address to the server and receives notification that the MAC address is a valid one.

Page 44: Ccna Discovery 7 8

11. Match the statement to the category. There are two statements per category. Statement: The MAC address filtering feature requires E AP to be enabled. A MAC address of a PC can be used by another PC controlled by an attacker. The MAC address filtering feature requires manual entry of approved MAC addresses. A wireless access point with MAC filtering configured disables non authorized wireless NIC's.

Category: True False

12. Match the term to the category. Note that not all terms will be used. Term: E AP WEP WPA Open SSID Wifi Pre shared keys

Category: Authentication Encryption

Search | Glossary

Course Index:

CCNA Discovery - Networking for Home and Small Businesses

8 Basic Security

8.0 Chapter Introduction

8.0.1 Introduction

Page 45: Ccna Discovery 7 8

Page 1:

8.0.1 IntroductionSingle Diagram

Diagram 1, Slide show

All over the world, people use networks to exchange sensitive information with each other.

People purchase products and do their banking over the Internet. We rely on networks to be secure and to protect our identities and our private information.

Network security is a shared responsibility that each person must accept when they connect to the network.

In this chapter, you will learn about the threats that exist on the network and how you can do your part to protect your computers and information.

After completion of this chapter, you should be able to: Identify and describe the various networking threats. Identify different methods of attack. Describe security procedures and applications. Describe the features of a firewall and how it can be used to protect against an attack.

8.1 Networking threats

8.1.1 Risks of Network Intrusion

Page 1:

Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals and organizations alike depend on their computers and networks for functions such as email, accounting, organization and file management. Intrusion by an unauthorized person can result in costly network outages and loss of work. Attacks to a network can be devastating and can result in a loss of time and money due to damage or theft of important information or assets.

Intruders can gain access to a network through software vulnerabilities, hardware attacks or even through less high-tech methods, such as guessing someone's username and password. Intruders who gain access by modifying software or exploiting software vulnerabilities are often called hackers.

Page 46: Ccna Discovery 7 8

Once the hacker gains access to the network, four types of threat may arise:

Information theft Identity theft Data loss / manipulation Disruption of service

8.1.1 Risks of Network IntrusionTwo Diagrams

Diagram 1, Interactive

The diagram depicts types of theft that can occur due to network intrusion, including information theft, identity theft, disruption of service, and data loss and manipulation. A brief description is given for each, as follows:

Information Theft Breaking into a computer to obtain confidential information. Information can be used or sold for various purposes. Example: Stealing an organization's proprietary information, such as research and development information.

Identity Theft A form of information theft where personal information is stolen for the purpose of taking over someone's identity. Using this information, an individual can obtain legal documents, apply for credit, and make unauthorized online purchases. Identity theft is a growing problem, costing billions of dollars per year.

Data Loss and Manipulation Breaking into a computer to destroy or alter data records. An example of data loss is sending a virus that re formats a computer's hard drive. An example of data manipulation is breaking into a records system to change information, such as the price of an item.

Disruption of Service Preventing legitimate users from accessing services. An example is Denial of Service (D o S) attacks to servers, network devices, or network communications links.

Page 2:

Page 47: Ccna Discovery 7 8

8.1.1 Risks of Network IntrusionDiagram 2, Activity

The diagram depicts an activity in which you must match the type of security threat to a scenario.

Type of threat:

A: Identity Theft. B: Information Theft. C: Disruption of Service. D: Data Manipulation. E: Data Loss.

Scenarios

One. Stealing an automotive engine design from a competitor. Two. Obtaining personal information to impersonate another and obtain credit. Three. Destroying database records on a computer hard drive. Four. Changing the grade received for a university course from a C to an A in the student records database. Five. Overloading a web server to reduce the performance preventing legitimate users from accessing it.

8.1.2 Sources of Network Intrusion

Page 1:

Security threats from network intruders can come from both internal and external sources.

External Threats

External threats arise from individuals working outside of an organization. They do not have authorized access to the computer systems or network. External attackers work their way into a network mainly from the Internet, wireless links or dialup access servers.

Internal Threats

Page 48: Ccna Discovery 7 8

Internal threats occur when someone has authorized access to the network through a user account or have physical access to the network equipment. The internal attacker knows the internal politics and people. They often know what information is both valuable and vulnerable and how to get to it.

However, not all internal attacks are intentional. In some cases, an internal threat can come from a trustworthy employee who picks up a virus or security threat, while outside the company and unknowingly brings it into the internal network.

Most companies spend considerable resources defending against external attacks however most threats are from internal sources. According to the FBI, internal access and misuse of computers systems account for approximately 70% of reported incidents of security breaches.

8.1.2 Sources of Network IntrusionSingle Diagram

Diagram 1, Image

The diagram depicts two types of network attacks, internal and external. A brief description of each is given below:

External Attack The diagram depicts a server (www.x y z corp.com) situated at X Y Z Corp. A hacker is working from his home. The hacker connects to the server via the Internet, and performs an attack on the server, causing it to stop working, or become unavailable.

Internal Attack The diagram depicts the X Y Z Corp. internal network. There are three hosts connected via a switch. A hacker working from inside the building is attempting to access the network, via the switch.

There is a speech bubble above the hacker that reads, "Top Secret."

8.1.3 Social Engineering and Phishing

Page 1:

One of the easiest ways for an intruder to gain access, whether internal or external is by exploiting human behavior. One of the more common methods of exploiting human weaknesses is called Social Engineering.

Page 49: Ccna Discovery 7 8

Social Engineering

Social engineering is a term that refers to the ability of something or someone to influence the behavior of a group of people. In the context of computer and network security Social Engineering refers to a collection of techniques used to deceive internal users into performing specific actions or revealing confidential information.

With these techniques, the attacker takes advantage of unsuspecting legitimate users to gain access to internal resources and private information, such as bank account numbers or passwords.

Social engineering attacks exploit the fact that users are generally considered one of the weakest links in security. Social engineers can be internal or external to the organization, but most often do not come face-to-face with their victims.

Three of the most commonly used techniques in social engineering are: pretexting, phishing, and vishing.

8.1.3 Social Engineering and PlanningTwo Diagrams

Diagram 1, Image

The diagram depicts an example of social engineering. A social engineer phones an unsuspecting employee from X Y Z Corp. to obtain their username and password to infiltrate the X Y Z Corp. network. There are speech bubbles in the diagram, as follows:

Social engineer, "Hi this is Amy from the help desk. We need to upgrade the software on your computer after work hours. What is your user ID and password? You can change the password tomorrow when you log in." Employee at X Y Z Corp., "Ok, my user ID and password are..."

Page 2:

Page 50: Ccna Discovery 7 8

Pretexting

Pretexting is a form of social engineering where an invented scenario (the pretext) is used on a victim in order to get the victim to release information or perform an action. The target is typically contacted over the telephone. For pretexting to be effective, the attacker must be able to establish legitimacy with the intended target, or victim. This often requires some prior knowledge or research on the part of the attacker. For example, if an attacker knows the target's social security number, they may use that information to gain the trust of their target. The target is then more likely to release further information.

Phishing

Phishing is a form of social engineering where the phisher pretends to represent a legitimate outside organization. They typically contact the target individual (the phishee) via email. The phisher might ask for verification of information, such as passwords or usernames in order prevent some terrible consequence from occurring.

Vishing / Phone Phishing

A new form of social engineering that uses Voice over IP (VoIP) is known as vishing. With vishing, an unsuspecting user is sent a voice mail instructing them to call a number which appears to be a legitimate telephone-banking service. The call is then intercepted by a thief. Bank account numbers or passwords entered over the phone for verification are then stolen.

8.1.3 Social Engineering and PlanningDiagram 2, Image

The diagram depicts an example of phishing. Note: Phishing is spelled with "p h", not "f". The hacker is phishing the Internet for people's bank details.

There is a message box:

"Banco Official: Please click on the link below and verify your checking account number and access code for our records.

Page 51: Ccna Discovery 7 8

www.banco bogus.com."

If the unsuspecting customer clicks the link and enters the information, the phisher is then able to log into their bank account.

8.2 Methods of attack

8.2.1 Viruses, Worms, and Trojan Horses

Page 1:

Social engineering is a common security threat which preys upon human weakness to obtain desired results.

In addition to social engineering, there are other types of attacks which exploit the vulnerabilities in computer software. Examples of these attack techniques include: viruses, worms and Trojan horses. All of these are types of malicious software introduced onto a host. They can damage a system, destroy data, as well as deny access to networks, systems, or services. They can also forward data and personal details from unsuspecting PC users to criminals. In many cases, they can replicate themselves and spread to other hosts connected to the network.

Sometimes these techniques are used in combination with social engineering to trick an unsuspecting user into executing the attack.

8.2.1 Viruses, Worms, and Trojan HorsesThree Diagrams Diagram 1, Image The diagram depicts three desktop computers, each being attacked with a different method of infiltration. The first computer shows a virus on the monitor screen. The second shows worms. The third shows a Trojan horse.

Page 2:

Viruses

Page 52: Ccna Discovery 7 8

A virus is a program that runs and spreads by modifying other programs or files. A virus cannot start by itself; it needs to be activated. Once activated, a virus may do nothing more than replicate itself and spread. Though simple, even this type of virus is dangerous as it can quickly use all available memory and bring a system to a halt. A more serious virus may be programmed to delete or corrupt specific files before spreading. Viruses can be transmitted via email attachments, downloaded files, instant messages or via diskette, CD or USB devices.

Worms

A worm is similar to a virus, but unlike a virus does not need to attach itself to an existing program. A worm uses the network to send copies of itself to any connected hosts. Worms can run independently and spread quickly. They do not necessarily require activation or human intervention. Self-spreading network worms can have a much greater impact than a single virus and can infect large parts of the Internet quickly.

Trojan Horses

A Trojan horse is a non-self replicating program that is written to appear like a legitimate program, when in fact it is an attack tool. A Trojan horse relies upon its legitimate appearance to deceive the victim into initiating the program. It may be relatively harmless or can contain code that can damage the contents of the computer's hard drive. Trojans can also create a back door into a system allowing hackers to gain access.

8.2.1 Viruses, Worms, and Trojan HorsesDiagram 2, Game The diagram depicts the download of a game, "Space Wars 3000, The Ultimate Intergalactic Game" by simulating the formatting of the hard disk drive. When the simulation is completed, a window displays the text, "Your data is safe. This was to show how easy it is to compromise a computer." The animation is demonstrating the danger of executing software that is downloaded from the Internet or received as a transmission attached to an email.

Page 3:

Page 53: Ccna Discovery 7 8

8.2.1 Viruses, Worms, and Trojan HorsesDiagram 3, Activity The diagram depicts an activity in which you must determine if the user's computer has been infected with a virus, worm, or Trojan horse. Examine the scenarios below and match the type of infection. One. Eliseo opened an email sent to him by his brother, Lomiel. A few hours later, Eliseo received several phone calls from friends saying that they received emails from him that he did not knowingly send. Two. Noah downloaded a file from the Internet. Shortly after he opened the file, his hard drive crashed and he lost all information on his computer. Three. Safa was surfing the Internet when a program appeared, claiming that she had won a prize. When she clicked to see what prize she had won, a program was installed on her computer without her knowledge. The program allowed an intruder access to her hard drive and personal information.

8.2.2 Denial of Service and Brute Force Attacks

Page 1:

Sometimes the goal of an attacker is to shut down the normal operations of a network. This type of attack is usually carried out with the intent to disrupt the functions of an organization.

Denial of Service (DoS)

DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users. DoS attacks can target end user systems, servers, routers, and network links.

In general, DoS attacks seek to:

Flood a system or network with traffic to prevent legitimate network traffic from flowing Disrupt connections between a client and server to prevent access to a service

Page 54: Ccna Discovery 7 8

There are several types of DoS attacks. Security administrators need to be aware of the types of DoS attacks that can occur and ensure that their networks are protected. Two common DoS attacks are:

SYN (synchronous) Flooding: a flood of packets are sent to a server requesting a client connection. The packets contain invalid source IP addresses. The server becomes occupied trying to respond to these fake requests and therefore cannot respond to legitimate ones.

Ping of death: a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device. This can cause the receiving system to crash.

8.2.2 Denial of Service and Brute Force AttacksThree Diagrams Diagram 1, Animation The diagram depicts a man sitting in front of his computer, labeled Denial of Service (D o S) attacker. He is connected to the Internet cloud. On the other side of the cloud is another user. The woman is sitting in front of her computer working in a business environment. There are two other computers directly connected to the Internet cloud, as well as a web server, at www.x y z corp.com. There are speech bubbles in the diagram, as follows: D o S attacker says, "I will send so many pings that the server can't respond to anyone else." The server responds, "Help, I can't accomplish any work!" The user states, "This website is very slow today."

Page 2:

Distributed Denial of Service (DDoS)

DDoS is a more sophisticated and potentially damaging form of the DoS attack. It is designed to saturate and overwhelm network links with useless data. DDoS operates on a much larger scale than DoS attacks. Typically hundreds or thousands of attack points attempt to overwhelm a target simultaneously. The attack points may be unsuspecting computers that have been previously infected by the DDoS code. The systems that are infected with the DDoS code attack the target site when invoked.

Brute Force

Page 55: Ccna Discovery 7 8

Not all attacks that cause network outages are specifically DoS attacks. A Brute force attack is another type of attack that may result in denial of services.

With brute force attacks, a fast computer is used to try to guess passwords or to decipher an encryption code. The attacker tries a large number of possibilities in rapid succession to gain access or crack the code. Brute force attacks can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts.

8.2.2 Denial of Service and Brute Force AttacksDiagram 2, Animation The diagram depicts a man sitting in front of his computer, labeled the Distributed Denial of Service (DD o S) Attacker. He is connected to the Internet cloud. On the other side of the cloud are two workers. There are two other computers connected to the Internet cloud, as well as a web server, at www.q z x bank.com. There are speech bubbles in the diagram, as follows: The man says, "I have infected computers across the internet with the DD o S code. I will activate them all now." The two workers on the network have the DD o S code activated and start transmitting packets to the Q Z X bank server. The server responds, "I am overloaded with too much traffic."

Page 3:

8.2.2 Denial of Service and Brute Force AttacksDiagram 3, Activity This activity is purposely inaccessible. The activity asks the student to attempt to establish a TCP connection to the web server during a Denial of Service attack. The activity requires you to start the D o S Attack by pressing the Start button and then quickly pressing the PC's located on the Inside network to try to establish a connection. The attempts are futile. The end result is a box that says, "Frustrating, isn't it? Now you can understand the effectiveness of the D o S Attack."

8.2.3 Spyware, Tracking Cookies, Adware and Popups

Page 1:

Not all attacks do damage or prevent legitimate users from having access to resources. Many threats are designed to collect information about users which can be used for advertising, marketing and research purposes. These include Spyware, Tracking Cookies, Adware and Popups. While these may not damage a computer, they invade privacy and can be annoying.

Page 56: Ccna Discovery 7 8

Spyware

Spyware is any program that gathers personal information from your computer without your permission or knowledge. This information is sent to advertisers or others on the Internet and can include passwords and account numbers.

Spyware is usually installed unknowingly when downloading a file, installing another program or clicking a popup. It can slow down a computer and make changes to internal settings creating more vulnerabilities for other threats. In addition, spyware can be very difficult to remove.

Tracking Cookies

Cookies are a form of spyware but are not always bad. They are used to record information about an Internet user when they visit websites. Cookies may be useful or desirable by allowing personalization and other time saving techniques. Many web sites require that cookies be enabled in order to allow the user to connect.

8.2.3 Spyware, Tracking Cookies, Ad ware, and PopupsTwo Diagrams Diagram 1, Image The diagram depicts two situations. The first situation is the use of spyware. The diagram depicts a computer connected to the Internet. An intruder captures the following types of information via the spyware application. IP address Computer name User names Websites visited Financial accounts Passwords

When he intruder uses captured data to gain information about the user, it is called spyware. The second situation is the use of cookies. Computers on a network keep cookies received from visited websites as an identification mark to recognize the user at the next visit. The caption states, "Hi Allen. Welcome back to our website! Here are our special sale items for today."

Page 57: Ccna Discovery 7 8

Page 2:

Adware

Adware is a form of spyware used to collect information about a user based on websites the user visits. That information is then used for targeted advertising. Adware is commonly installed by a user in exchange for a "free" product. When a user opens a browser window, Adware can start new browser instances which attempt to advertize products or services based on a user's surfing practices. The unwanted browser windows can open repeatedly, and can make surfing the Internet very difficult, especially with slow Internet connections. Adware can be very difficult to uninstall.

Popups and pop-unders

Popups and pop-unders are additional advertising windows that display when visiting a web site. Unlike Adware, popups and pop-unders are not intended to collect information about the user and are typically associated only with the web-site being visited.

Popups: open in front of the current browser window. Pop-unders: open behind the current browser window.

They can be annoying and usually advertise products or services that are undesirable.

8.2.3 Spyware, Tracking Cookies, Ad ware, and PopupsDiagram 2, Image The diagram depicts a desktop computer with several web pages open on the monitor screen, resulting from popups and pop unders.

8.2.4 Spam

Page 1:

Page 58: Ccna Discovery 7 8

Another annoying by-product of our increasing reliance on electronic communications is unwanted bulk email. Sometimes merchants do not want to bother with targeted marketing. They want to send their email advertising to as many end users as possible hoping that someone is interested in their product or service. This widely distributed approach to marketing on the Internet is called spam.

Spam is a serious network threat that can overload ISPs, email servers and individual end-user systems. A person or organization responsible for sending spam is called a spammer. Spammers often make use of unsecured email servers to forward email. Spammers can use hacking techniques, such as viruses, worms and Trojan horses to take control of home computers. These computers are then used to send spam without the owner's knowledge. Spam can be sent via email or more recently via Instant messaging software.

It is estimated that every user on the Internet receives over 3,000 spam emails in a year. Spam consumes large amounts of Internet bandwidth and is a serious enough problem that many countries now have laws governing spam use.

8.2.4 SpamSingle Diagram

Diagram 1, Animation

Animation depicts a spammer's computer connected to an Open Relay Mail Server. Eleven computers are also connected to this mail relay. The spammer sends one copy of the mail to this server, and the relay passes it to all connected computers.

8.3 Security Policy

8.3.1 Common Security Measures

Page 1:

Security risks cannot be eliminated or prevented completely. However, effective risk management and assessment can significantly minimize the existing security risks. To minimize the amount of risk, it is important to understand that no single product can make an organization secure. True network security comes from a combination of products and services, combined with a thorough security policy and a commitment to adhere to that policy.

Page 59: Ccna Discovery 7 8

A security policy is a formal statement of the rules that users must adhere to when accessing technology and information assets. It can be as simple as an acceptable use policy, or can be several hundred pages in length, and detail every aspect of user connectivity and network usage procedures. A security policy should be the central point for how a network is secured, monitored, tested and improved upon. While most home users do not have a formal written security policy, as a network grows in size and scope, the importance of a defined security policy for all users increases drastically. Some things to include in a security policy are: identification and authentication policies, password policies, acceptable use policies, remote access policies, and incident handling procedures.

When a security policy is developed, it is necessary that all users of the network support and follow the security policy in order for it to be effective.

8.3.1 Common Security MeasuresTwo Diagrams

Diagram 1, Interactive

The diagram depicts a list of policies and gives a brief description of each.

Identification and Authentication Policies Specifies authorized persons that can have access to network resources and verification procedures. This includes physical access to wiring closets and critical network resources such as servers, switches, routers, and access points. Password Policies Ensures passwords meet minimum requirements and are changed regularly. Acceptable Use Policies Identifies network applications and usages that are acceptable. Remote Access Policies Identifies how remote users can access a network and what is accessible via remote connectivity.

Network Maintenance Procedure Specifies network device operating systems and end user application update procedures. Incident Handling Procedures Describes how security incidents will be handled.

Page 2:

A security policy should be the central point for how a network is secured, monitored, tested and improved upon. Security procedures implement security policies. Procedures define configuration, login, audit, and maintenance processes for hosts and network devices. They

Page 60: Ccna Discovery 7 8

include the use of both preventative measures to reduce risk, as well as active measure for how to handle known security threats. Security Procedures can range from simple, inexpensive tasks such as maintaining up-to-date software releases, to complex implementations of firewalls and intrusion detection systems.

Some of the security tools and applications used in securing a network include:

Software patches and updates Virus protection Spyware protection Spam blockers Popup blockers Firewalls

8.3.1 Common Security MeasuresDiagram 2, Interactive

The diagram depicts several security tools and gives a brief description of each.

Firewall A security tool that controls traffic to and from a network. Diagram is of a brick wall.

Spam Filter Software installed on an end user workstation or server to identify and remove unwanted emails. Diagram is of a spam email with a red line through it.

Patches and Updates Software applied to an OS or application to correct a known security vulnerability or add functionality. Diagram is of a fabric patch.

Anti spy ware Software installed on an end user workstation to detect and remove spy ware and ad ware. Diagram is of a pair of binoculars.

Pop up blocker Software installed on an end user workstation to prevent pop up and pop under advertisement windows from displaying. Diagram is of a browser window with a red line through it.

Anti virus Software installed on an end user workstation or server to detect and remove viruses, worms, and

Page 61: Ccna Discovery 7 8

Trojan horses from files and email. Diagram is of a virus infected computer with a red line through it.

8.3.2 Updates and Patches

Page 1:

Patches and Updates

One of the most common methods that a hacker uses to gain access to hosts and/or networks is through software vulnerabilities. It is important to keep software applications up-to-date with the latest security patches and updates to help deter threats. A patch is a small piece of code that fixes a specific problem. An update, on the other hand, may include additional functionality to the software package as well as patches for specific issues.

OS (operating system, such as Linux, Windows, etc.) and application vendors continuously provide updates and security patches that can correct known vulnerabilities in the software. In addition, vendors often release collections of patches and updates called service packs. Fortunately, many operating systems offer an automatic update feature that allows OS and applications updates to be automatically downloaded and installed on a host.

8.3.2 Updates and PatchesSingle Diagram

Diagram 1, Image

The diagram is a screen shot of the Windows Automatic Update panel. It shows the Automatic radio button selected. It also shows that the computer is set to check every day at 3:00 A M for new updates.

8.3.3 Anti-virus Software

Page 1:

Antivirus Software (Detecting a virus)

Page 62: Ccna Discovery 7 8

Even when the OS and applications have all the current patches and updates, they may still be susceptible to attack. Any device that is connected to a network is susceptible to viruses, worms and Trojan horses. These may be used to corrupt OS code, affect computer performance, alter applications, and destroy data.

Some of the signs that a virus, worm or Trojan horse may be present include:

Computer starts acting abnormally Program does not respond to mouse and keystrokes Programs starting or shutting down on their own Email program begins sending out large quantities of email CPU usage is very high There are unidentifiable, or a large number of processes running Computer slows down significantly or crashes

8.3.3 Antivirus SoftwareTwo Diagrams

Diagram 1, Image

The diagram is a screen shot showing a fatal exception, known as the Windows blue screen of death.

Page 2:

Anti-virus Software

Anti-virus software can be used as both a preventative tool and as a reactive tool. It prevents infection and detects, and removes, viruses, worms and Trojan horses. Anti-virus software should be installed on all computers connected to the network. There are many Anti-virus programs available.

Some of the features that can be included in Anti-virus programs are:

Page 63: Ccna Discovery 7 8

Email checking - Scans incoming and outgoing emails, and identifies suspicious attachments.

Resident dynamic scanning - Checks executable files and documents when they are accessed.

Scheduled scans - Virus scans can be scheduled to run at regular intervals and check specific drives or the entire computer.

Automatic Updates - Checks for, and downloads, known virus characteristics and patterns. Can be scheduled to check for updates on a regular basis.

Anti-virus software relies on knowledge of the virus to remove it. Therefore, when a virus is identified, it is important to report it or any virus-like behavior to the network administrator. This is normally done by submitting an incident report according to the company's network security policy.

Network administrators can also report new instances of threats to the local governmental agency that handle security problems. For example, an agency in the U.S. is: https://forms.us-cert.gov/report/. This agency is responsible for developing counter measures to new virus threats as well as ensuring that those measures are available to the various anti-virus software developers.

8.3.3 Antivirus SoftwareDiagram 2, Image

The diagram is a screen shot showing antivirus software, AVG Free Edition Control Center.

8.3.4 Anti-spam

Page 1:

Spam is not only annoying; it can overload email servers and potentially carry viruses and other security threats. Additionally, Spammers take control of a host by planting code on it in the form of a virus or a Trojan horse. The host is then used to send spam mail without the user's knowledge. A computer infected this way is known as a Spam mill.

Anti-spam software protects hosts by identifying spam and performing an action, such as placing it into a junk folder or deleting it. It can be loaded on a machine locally, but can also be loaded on email servers. In addition, many ISPs offer spam filters. Anti-spam software does not

Page 64: Ccna Discovery 7 8

recognize all spam, so it is important to open email carefully. It may also accidentally identify wanted email as spam and treat it as such.

8.3.4 AntispamTwo Diagrams

Diagram 1, Animation

The diagram depicts a PC sending a spam email to a mail server, which is running antispam software. The server blocks the spam from reaching the attached computers.

Page 2:

In addition to using spam blockers, other preventative actions to prevent the spread of spam include:

Apply OS and application updates when available. Run an Antivirus program regularly and keep it up to date. Do not forward suspect emails. Do not open email attachments, especially from people you do not know. Set up rules in your email to delete spam that by-pass the anti-spam software. Identify sources of spam and report it to a network administrator so it can be blocked. Report incidents to the governmental agency that deals with abuse by spam.

One of the most common types of spam forwarded is a virus warning. While some virus warnings sent via email are true, a large amount of them are hoaxes and do not really exist. This type of spam can create problems because people warn others of the impending disaster and so flood the email system. In addition, network administrators may overreact and waste time investigating a problem that does not exist. Finally, many of these emails can actually contribute to the spread of viruses, worms and Trojan horses. Before forwarding virus warning emails, check to see if the virus is a hoax at a trusted source such as: http://vil.mcafee.com/hoax.asp or http://www.virusbtn.com/resources/hoaxes/index

8.3.4 AntispamDiagram 2, Image

The diagram depicts a PC with an open mail message on the screen. The email reads, as follows:

Page 65: Ccna Discovery 7 8

From: Ivan To: Huge number of people

WARNING! A terrible virus will attack on Friday and will reformat your hard drive. Please back up all of your data to be safe and forward this email to everyone you know.

The emailed virus warning may be a hoax that can result in people doing extra work and actually flooding email onto the network in an attempt to warn others.

8.3.5 Anti-spyware

Page 1:

Anti-Spyware and Adware

Spyware and adware can also cause virus-like symptoms. In addition to collecting unauthorized information, they can use important computer resources and affect performance. Anti-spyware software detects and deletes spyware applications, as well as prevents future installations from occurring. Many Anti-Spyware applications also include detection and deletion of cookies and adware. Some Anti-virus packages include Anti-Spyware functionality.

Popup Blockers

Popup stopper software can be installed to prevent popups and pop-unders. Many web browsers include a popup blocker feature by default. Note that some programs and web pages create necessary and desirable popups. Most popup blockers offer an override feature for this purpose.

8.3.5 Anti spywareTwo Diagrams

Diagram 1, Image

The diagram depicts a screen shot of the anti spyware application, Spy bot Search & Destroy.

Page 2:

Page 66: Ccna Discovery 7 8

8.3.5 Anti spywareDiagram 2, Activity

The diagram depicts an activity in which you must match each security tool to the proper scenario.

Security tools

A: Anti spyware B: Patches and Updates C: Spam Filter D: Popup Blocker E: Anti virus

Scenarios

One.Software installed on an end user workstation or server to detect and remove viruses, worms, and Trojan horses from files and email.

Two.Software installed on an end user workstation to detect and remove spyware and ad ware.

Three.Software installed on an end user workstation or server to identify and remove unwanted emails.

Four.Software applied to an OS or application to correct a known security vulnerability, or add functionality.

Five.Software installed on an end user workstation to prevent popup and popunder advertisement windows from displaying.

8.4 Using Firewalls

8.4.1 What is a Firewall?

Page 1:

In addition to protecting individual computers and servers attached to the network, it is important to control traffic traveling to and from the network.

A Firewall is one of the most effective security tools available for protecting internal network users from external threats. A firewall resides between two or more networks and controls the traffic between them as well as helps prevent unauthorized access. Firewall products use various techniques for determining what is permitted or denied access to a network.

Page 67: Ccna Discovery 7 8

Packet Filtering - Prevents or allows access based on IP or MAC addresses. Application Filtering - Prevents or allows access to specific application types based on

port numbers. URL Filtering - Prevents or allows access to websites based on specific URLs or

keywords. Stateful Packet Inspection (SPI) - Incoming packets must be legitimate responses to

requests from internal hosts. Unsolicited packets are blocked unless permitted specifically. SPI can also include the capability to recognize and filter out specific types of attacks such as DoS.

Firewall products may support one or more of these filtering capabilities. Additionally, Firewalls often perform Network Address Translation (NAT). NAT translates an internal address or group of addresses into an outside, public address that is sent across the network. This allows internal IP addresses to be concealed from outside users.

8.4.1 What is a Firewall?Two Diagrams

Diagram 1, Animation

The diagram depicts a firewall. There is a PC and a world globe representing the Internet. A brick wall is between the PC and the globe (Internet). The wall has a small hole in it, which allows specific communication between the Internet and the PC. There are multiple connections from the Internet, which have been blocked by the brick wall.

Page 2:

Firewall products come packaged in various forms:

Appliance-based firewalls - An appliance-based firewall is a firewall that is built-in to a dedicated hardware device known as a security appliance.

Server-based firewalls - A server-based firewall consists of a firewall application that runs on a network operating system (NOS) such as UNIX, Windows or Novell.

Integrated Firewalls - An integrated firewall is implemented by adding firewall functionality to an existing device, such as a router.

Page 68: Ccna Discovery 7 8

Personal firewalls - Personal firewalls reside on host computers and are not designed for LAN implementations. They may be available by default from the OS or may be installed from an outside vendor.

8.4.1 What is a Firewall?Diagram 2, Interactive

The diagram depicts several types of firewall products, as follows:

Cisco Security Appliances Dedicated firewall devices with specialized computers that do not have peripherals or hard drives. Appliance based firewalls can inspect traffic faster and are less prone to failure.

Server based Firewall Firewall applications that generally provide a solution that combines an S P I firewall and access control, based on IP address or application. Server based firewalls can be less secure than dedicated, appliance based firewalls because of the security weaknesses of the general purpose OS.

Linksys Wireless Router with Integrated Firewall Most home integrated routers have built in basic firewall capabilities that support packet, application, and website filtering. Higher end routers that run special operating systems, like Cisco Internetwork Operating System (I O S), also have firewall capabilities that can be configured.

Personal Firewall Client side firewalls that typically filter using S P I. The user may be prompted to allow certain applications to connect, or may define a list of automatic exceptions. Personal firewalls are often used when a host device is connected directly to an ISP modem. It may interfere with Internet access if not properly configured. It is not recommended to use more than one personal firewall at a time, since they can conflict with one another.

8.4.2 Using a Firewall

Page 1:

By placing the firewall between the internal network (intranet) and the Internet as a border device, all traffic to and from the Internet can be monitored and controlled. This creates a clear line of defense between the internal and external network. However, there may be some external customers that require access to internal resources. A demilitarized zone (DMZ) can be configured to accomplish this.

Page 69: Ccna Discovery 7 8

The term demilitarized zone is borrowed from the military, where a DMZ is a designated area between two powers where military activity is not permitted. In computer networking, a DMZ refers to an area of the network that is accessible to both internal and external users. It is more secure than the external network but not as secure as the internal network. It is created by one or more firewalls to separate the internal, DMZ and external networks. Web servers for public access are frequently placed in a DMZ.

8.4.2 Using a FirewallFour Diagrams

Diagram 1, Animation

The diagram depicts the use of a firewall to allow and block traffic. There are three parts to the network: Internal, External, and DMZ.

Internal The internal network has two hosts and one FTP server, which are connected to a switch. The switch is connected to a router, which is acting as a firewall.

External The external network has a router, which is acting as a firewall. The router connects to the Internet.

DMZ The DMZ is the area between the internal router and external router. There is a switch, which connects the two routers. There is a web server connected to the switch.

A web request is sent from one of the hosts within the internal network. The web request is sent to the switch and forwarded to the internal router. There are speech bubbles in the diagram, as follows:

The router says, "This request is permitted."

The web request is then forwarded to the switch within the DMZ, and then to the web server.

The web server says, "Got the request. I will send a response."

The response is then forwarded back to the source host.

An FTP request is sent from one of the hosts within the internal network. The FTP request is sent to the switch, and then forwarded to the internal FTP server. There is a speech bubble in the diagram, as follows:

The FTP server says, "Got the request. I will send a response."

Page 70: Ccna Discovery 7 8

A response is then sent from the FTP server to the source host.

A web request is sent from a host on the Internet. The request is forwarded to the external router. There are speech bubbles in the diagram, as follows:

The external router says, "This request is permitted."

The packet is then forwarded to the web server.

The web server says, "Got the request. I will send a response."

A response is then sent from the web server to the source host.

A FTP request is sent from a host on the Internet. The request is forwarded to the external router. There are speech bubbles in the diagram, as follows:

The External Router says, "The request is permitted."

The packet is then forwarded through the switch to the internal router.

The internal router says, "This request is denied."

The packet is then dropped.

Page 2:

Single firewall configuration

A single firewall has three areas, one for the external network, the internal network, and the DMZ. All traffic is sent to the firewall from the external network. The firewall is then required to monitor the traffic and determine what traffic should be passed to the DMZ, what traffic should be passed internally, and what should be denied altogether.

Two firewall configuration

In a two firewall configuration, there is an internal and external firewall with the DMZ located between them. The external firewall is less restrictive and allows Internet user access to the services in the DMZ as well as allowing a traffic that any internal user requested to pass through.

Page 71: Ccna Discovery 7 8

The internal firewall is more restrictive and protects the internal network from unauthorized access.

A single firewall configuration is appropriate for smaller, less congested networks. However, a single firewall configuration does have a single point of failure and can be overloaded. A two-firewall configuration is more appropriate for larger, more complex networks that handle a lot more traffic.

8.4.2 Using a FirewallDiagram 2, Interactive

The diagram depicts the use of one firewall and two firewall configurations that allow and block traffic on the network.

One Firewall Configuration There are two parts to this network.

Internal The Internal network has two hosts and one FTP server, which are connected to a switch. The switch is connected to a router, which is acting as a firewall.

The router that is connected to the internal network is also attached to the Internet. This acts as a firewall for traffic coming into the network from the Internet.

The router to the internal network and Internet also has a web server attached. This allows traffic from the Internet to access the web server, and also allows traffic from the internal network to access the web server. The web server is in the DMZ.

Two Firewall Configuration There are three parts to the network: internal, external, and DMZ.

Internal The Internal network has two hosts and one FTP Server, which are connected to a switch. The switch is connected to a router, which is acting as a firewall.

External The external network has a router, which is acting as a firewall. The router connects to the Internet

DMZ The DMZ is the area between the Internal router and external router. There is a switch, which connects the two routers together. There is a web server connected to the switch.

Page 72: Ccna Discovery 7 8

Page 3:

Many home network devices, such as integrated routers, frequently include multi-function firewall software. This firewall typically provides Network Address Translation (NAT), Stateful Packet Inspection (SPI) and IP, Application and web site filtering capabilities. They also support DMZ capabilities.

With the integrated router, a simple DMZ can be set up that allows an internal server to be accessible by outside hosts. To accomplish this, the server requires a static IP address that must be specified in the DMZ configuration. The integrated router isolates traffic destined to the IP address specified. This traffic is then forwarded only to the switch port where the server is connected. All other hosts are still protected by the firewall.

When the DMZ is enabled, in its simplest form, outside hosts can access all ports on the server, such as 80 (HTTP), 21 (FTP), and 110 (Email POP3), etc.

A more restrictive DMZ can be set up using the port forwarding capability. With port forwarding, ports that should be accessible on the server are specified. In this case, only traffic destined for those port(s) is allowed, all other traffic is excluded.

The wireless access point within the integrated router is considered part of the internal network. It is important to realize that if the wireless access point is unsecured, anyone who connects to it is within the protected part of the internal network and is behind the firewall. Hackers can use this to gain access to the internal network and completely bypass any security.

8.4.2 Using a FirewallDiagram 3, Image The diagram depicts the use of an integrated router on a network. All users from the Internet are able to access the internal web server, as the integrated router has been configured to allow this server to be in the DMZ. The local computers (H1 and H2) are depicted as being on the internal network.

Page 4:

Page 73: Ccna Discovery 7 8

Lab Activity

Configure firewall settings using the Linksys GUI interface and use it to create a DMZ.

Click on the lab icon to begin.

8.4.2 Using a FirewallDiagram 4, Lab Activity

Link to Hands on Lab: Configuring Access Policies and DMZ Settings

This lab is available in accessible format through the Cisco website

8.4.3 Vulnerability Analysis

Page 1:

There are many vulnerability analysis tools for testing host and network security. These are known as security scanners, and can help identify areas where attacks might occur and offer guidance on steps that can be taken. While the capabilities of the vulnerability analysis tools can vary based on manufacturer, some of the more common features include determining:

Number of hosts available on a network The services hosts are offering The operating system and versions on the hosts Packet filters and firewalls in use

8.4.3 Vulnerability AnalysisSingle Diagram

Diagram 1, Image

The diagram depicts a circle (Internal Network), with a magnifying glass looking into it. Inside the circle there is a router acting as a firewall. Attached to the router is a DMZ, with a web server. Attached to the router is a switch, with two hosts and an FTP server attached.

Page 74: Ccna Discovery 7 8

Page 2:

Lab Activity

Research, download and install a Security Vulnerability tester and use it to determine weaknesses in a host and the network.

Click the lab icon to begin.

8.4.3 Vulnerability AnalysisDiagram 2, Lab Activity

Link to Hands on Lab: Performing Vulnerability Analysis

This lab is available in accessible format through the Cisco website.

8.4.4 Best Practices

Page 1:

There are several recommended practices to help mitigate the risks they pose, including:

Define security policies Physically secure servers and network equipment Set login and file access permissions Update OS and applications Change permissive default settings Run anti-virus and anti-spyware Update antivirus software files Activate browser tools - Popup stoppers, anti-phishing, plug-in monitors Use a firewall

Page 75: Ccna Discovery 7 8

The first step towards securing a network is to understand how traffic moves across the network and the different threats and vulnerabilities that exist. Once security measures are implemented, a truly secure network needs to be monitored constantly. Security procedures and tools need to be reviewed in order to stay ahead of evolving threats.

8.4.4 Best PracticesSingle Diagram

Diagram 1, Image

The diagram depicts some security tools which can be used to protect networks. These include antivirus software, patches and updates, popup blockers, antispyware software, spam filters, and firewalls.

8.5 Chapter Summary

8.5.1 Summary

Page 1:

8.5.1 SummaryFour Diagrams, Slider Graphic

Diagram 1, Image

The diagram depicts a social engineer and an unsuspecting employee. A Social Engineer sitting at her workstation says "Hi, this is Amy from the help desk. We need to upgrade the software on your computer after work hours. What is your user ID and password? You can change the password tomorrow when you log in."

Unsuspecting employee at X Y Z Corporation sitting at her workstation says "Ok, my user ID and password are."

Diagram 1 text

This chapter discussed various networking threats, such as information theft, Identity theft, data loss and manipulation, and disruption of service. Hackers are intruders who gain access to a network through software vulnerabilities, hardware attacks, or through weaknesses of individuals. Attacks can come from internal and external sources. Internal attacks account for approximately 70% of security incidents. Social engineering is a group of techniques used to deceive internal users into performing specific actions or revealing confidential information.

Page 76: Ccna Discovery 7 8

Three types of social engineering include pre texting, phishing, and vishing.

Diagram 2, Image

The diagram depicts security threats, such as viruses, worms, Trojans, spyware, tracking cookies, spam, and denial of service.

Diagram 2 text

There are other threats to the security of networks and computers in addition to social engineering attacks. Viruses are programs that once activated spreads by modifying other programs or files, causing damage to files, or erasing them completely. A worm is similar to a virus except it runs independently and spreads by resending itself as an email attachment or part of a network message. A Trojan horse is a program that appears legitimate. Once initiated, it can damage a hard drive or create a back door into a system allowing hackers to gain access.

Diagram 3, Image

The diagram depicts security measures, such as firewall, spam filter, patches, and updates, antivirus, popup blocker, and antispyware.

Diagram 3 text

Effective network security comes from a combination of products and services, combined with a thorough security policy and a commitment to adhere to that policy. A security policy should include identification and authentication policies, password policies, acceptable use policies, remote access policies, and incident handling procedures. All users of the network must support and follow the security policy in order for it to be effective. Tools and applications used in securing a network include the following: Software patches and updates Virus protection Spyware protection Spam blockers Popup blockers Firewalls Keep software applications up to date with the latest security patches and updates to help deter threats. Antivirus software, installed on every computer, detects and removes known viruses, worms and Trojan horses. Antispam software identifies spam and places it into a junk folder or deletes it.

Diagram 4, Image

Page 77: Ccna Discovery 7 8

The diagram depicts a firewall protecting an internal computer.

Diagram 4 text

A firewall controls the traffic between networks and helps prevent unauthorized access. Firewall products use various techniques for determining what is permitted or denied access to a network. Packet filtering controls access based on IP or MAC addresses Application/website filtering controls access based on the application. Stateful Packet Inspection (SP I) ensures incoming packets are legitimate responses to requests from internal hosts. SP I can recognize and filter out attacks, such as D o S. A DMZ is an area of the network that is accessible to both internal and external users If the wireless access point is unsecured, anyone who connects to it is considered part of the internal network, and is on the protected side of the firewall. Vulnerability analysis tools, such as security scanners, help identify areas where attacks might occur and offer guidance on steps that can be taken.

8.6 Chapter Quiz

8.6.1 Quiz

Page 1:

Take the chapter quiz to check your knowledge.

Click the quiz icon to begin.

8.6.1 Quiz10 Questions:

Basic Security

1. Match the network threat to the definition.

Network threat: Data loss Identity theft Information theft Data manipulation Disruption of service.

Page 78: Ccna Discovery 7 8

Definition: Destroying data on a hard drive. Changing data for personal gain. Overloading a server to reduce its performance. Stealing data on a hard drive to gain a competitive advantage. Stealing information to impersonate someone and usually to obtain credit.

2. How does a phisher typically contact a victim? by email by telephone by voice over IP phone through a person they know in common

3. A file is downloaded from the Internet. After the user opens the downloaded file, the user's hard drive crashes and all information on the computer is lost. What type of attack occurred? Worm Virus Trojan horse Denial of Service

4. In rapid succession, an intruder tries a large number of possibilities to guess passwords. As a result, other users on the network are locked out. What type of attack occurred? DD o S brute force ping of death SYN flooding

5. What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user? ad ware popups spyware popunders

6. A network administrator is trouble shooting a computer that is operating strangely. It boots slowly programs will not load and the keyboard responds very slowly. What is the best action for the administrator to take? Attach a different keyboard. Attach the PC to the Internet to check the operating system website for patches. Add the PC to your network to see if it can communicate with other PC's. Boot the PC and run antivirus and antispyware applications from an external drive.

7. Match the term to the best description.

Term: NAT

Page 79: Ccna Discovery 7 8

Stateful packet inspection Simple packet filtering Website filtering

Description: Can look inside the packet up through layer 7. Allows or denies access base on a URL. Allows or denies access based on an IP or MAC address. Keeps external users from knowing the IP address used inside the network.

8. Match the term to the definition. Term: Personal firewall integrated firewall server based firewall appliance based firewall

Definition: A feature of a network device such as a router. An application designed to protect a home PC. A device that has the sole function of being a firewall. An application designed to protect the enterprise network.

9. What are three security features commonly found on an ISR? (Choose three) DMZ NAT SP I HTTP POP3 Server based firewall

10. What are two purposes of a DMZ? (Choose two) To translate internal private addresses into outside public addresses. To create a software based firewall on a server that performs other functions. To prevent or deny access to a network device based on the type of application being used. To create a network area that allows internal resources, such as a web server, To be accessed by external users. To establish a network area where network resources can be shared by both internal and external users. To create a safe network area that allows a corporate web server to be accessed by internal users only.

Page 80: Ccna Discovery 7 8

Recommended