Está en la página 1de 33

Module 5: Wireless

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Jaringan tanpa kabel sebenarnya tidak sesulit sistem cable network

bahkan lebih mudah. Sistem jaringan WIFI atau Wireless tidak memerlukan penghubung cable network antar computer.

Keuntungan dari sistem WIFI , pemakai tidak dibatasi ruang gerak

dan hanya dibatasi pada jarang jangkauan dari satu titik pemancar WIFI. Untuk jarak pada sistem WIFI mampu menjangkau area 100feet atau 30M radius. Selain itu dapat diperkuat dengan perangkat khusus seperti booster yang berfungsi sebagai relay yang mampu menjangkau ratusan bahkan beberapa kilometer ke satu arah (directional).

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Adhoc

Adhoc adalah sistem peer to peer, dalam arti satu computer dihubungkan ke 1 computer dengan saling mengenal SSID. Jadi terdapat 2 computer dengan perangkat WIFI dapat langsung berhubungan tanpa alat yang disebut access point mode.

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Berbasis Infrastruktur / BSS (Basic set Service)

Sistem Infra Structure membutuhkan sebuah perangkat khusus atau dapat difungsikan sebagai Access point Mirip seperti Hub. Access Point inilah yang memberikan tanda apakah disuatu tempat memiliki jaringan WIFI dan secara terus menerus mentransmisikan namanya - Service Set IDentifier (SSID) dan dapat diterima oleh computer lain untuk dikenal.

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Berbasis Infrastruktur / ESS (Extended set Service)

Sistem Infra Structure membutuhkan lebih dari sebuah perangkat khusus atau dapat difungsikan sebagai Access point Mirip seperti Hub. Access Point inilah yang memberikan tanda apakah disuatu tempat memiliki jaringan WIFI dan secara terus menerus mentransmisikan namanya Service Set IDentifier (SSID) dan dapat diterima oleh computer lain untuk dikenal.

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

10

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

11

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

12

Wireless LAN security issues


The progession of WLAN security standard:

Wired Equivalent Privacy WEP

SSID cloaking and MAC Filtering


The Cisco interim solution between WEP and 802.11i Wi-Fi Protected Access WPA IEEE 802.11i and WPA-2

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

13

WLAN vulnerabilities and solutions

Vulnerability
War drivers
Hackers stealing information in a WLAN Hackers again access to the rest of the network Employee AP installation

Solution
Strong authentication
Strong encryption

Strong authentication

IDS, including Cisco SWAN

Rogue AP

Strong authentication, IDS/SWAN

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

14

1997

2001

2003

2004 to Present

WEP
Basic encryption No strong authentication Static, breakable keys Not scalable

802.1x EAP
Dynamic keys Improved encryption User authentication 802.1X EAP (LEAP, PEAP)

WPA
Standardized Improved encryption Strong, user authentication (such as, LEAP, PEAP, EAPFAST)

802.11i / WPA2
AES strong encryption Authentication Dynamic key management

MAC filters and SSID-cloaking also used to complement WEP

RADIUS

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

15

Module 5: IPv6

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

16

Internet Users or PC

~530 million users in Q2 CY2002, ~945 million by 2004 (Source: Computer Industry Almanac) Emerging population/geopolitical and Address space
PDA, Pen-Tablet, Notepad,

~20 millions in 2004


Mobile phones

Already 1 billion mobile phones delivered by the industry


Transportation

1 billion automobiles forecast for 2008 Internet access in Planes


Consumer devices Billions of Home and Industrial Appliances
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

18

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

19

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

20

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

21

Global Route Aggregation for Efficient Routing Conventions for Representing IPv6 Addresses Convention for Writing IPv6 Prefixes Global Unicast Prefix Assignment Example Subnetting Global Unicast IPv6 Addresses Inside an Enterprise Prefix Terminology

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

22

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

23

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

24

IPv6 prefixes represent a range or block of consecutive IPv6

addresses, the number that represent the range of addresses, called a Prefix
IPv6 classless and classfull addressing, and IPv6 addressing

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

25

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

26

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

27

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

28

IPv6 Address format with interface ID and EUI-64

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

29

IPv4/IPv6 Dual Stacks The term dual stack means that the host or router uses both IPv4 and IPv6 at the same time. The dual stack approach can be a reasonable plan of attack to migrate an enterprise to IPv6 for communication inside the enterprise

Tunneling Another tool to support the IPv4-to-IPv6 transition is Tunneling

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

30


Example IPv6-to-IPv4 tunnel, Physical and Logical View

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

31

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

32

Thank you.

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

33

También podría gustarte