© 2006 Cisco Systems, Inc. All rights reserved.ONT v1.06-1 Implement Wireless Scalability Configuring Encryption and Authentication on Lightweight Access.

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved.ONT v Module Summary Video and voice applications are used with wireless clients as well as wired.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary WLANs are shared networks that provide access to networks for multiple users.
© 2006 Cisco Systems, Inc. All rights reserved.ONT v Implement the DiffServ QoS Model Implementing QoS Preclassify.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary An IPsec VPN is a collection of protocols that help you to hook up your company.
© 2006 Cisco Systems, Inc. All rights reserved.BCMSN v Wireless LANs Describing WLAN Topologies.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Configuring Rules Common to Windows and UNIX.
© 2006 Cisco Systems, Inc. All rights reserved.CIPT2 v Monitor and Manage IP Telephony Introducing Cisco Unified CallManager Serviceability.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Policies Building an Agent Kit.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco Secure ACS can be used as AAA server to manage identity. Cisco IBNS uses.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Implementing the Cisco VPN Client.
© 2006 Cisco Systems, Inc. All rights reserved.ONT v Implement Wireless Scalability Implementing WLAN QoS.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary The IKE protocol is a key management protocol standard used in conjunction with.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary Key switch security issues should be identified on a switched network and.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary Serial point-to-point connections are used to connect your LAN and a service.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Implementation of Frame Mode MPLS Implementing Frame Mode MPLS.
© 2006 Cisco Systems, Inc. All rights reserved. CVOICE v VoIP Signaling and Call Control Deploying and Configuring H.323.
© 2005 Cisco Systems, Inc. All rights reserved. IPTX v Configuring Additional Cisco CallManager Express Features Configuring Cisco CallManager Express.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Site-to-Site IPsec VPN Operation.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Secured Connectivity Examining Cisco IOS VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Policies Managing Hosts and Deploying Software Updates.
Транксрипт:

© 2006 Cisco Systems, Inc. All rights reserved.ONT v Implement Wireless Scalability Configuring Encryption and Authentication on Lightweight Access Points

© 2006 Cisco Systems, Inc. All rights reserved.ONT v Open Authentication

© 2006 Cisco Systems, Inc. All rights reserved.ONT v Open Authentication

© 2006 Cisco Systems, Inc. All rights reserved.ONT v Static WEP Key Authentication

© 2006 Cisco Systems, Inc. All rights reserved.ONT v Static WEP Key

© 2006 Cisco Systems, Inc. All rights reserved.ONT v WPA Preshared Key This example shows WPA preshared key

© 2006 Cisco Systems, Inc. All rights reserved.ONT v Web Authentication

© 2006 Cisco Systems, Inc. All rights reserved.ONT v Web Authentication Users authenticate via a web browser interface. Clients using HTTP are automatically directed to a login page: –Customizable for logos and text –Maximum simultaneous authentication requests21 –Maximum local web authentication users2500 Generally used for guest access: –Data is not secure between the access point and the client.

© 2006 Cisco Systems, Inc. All rights reserved.ONT v Web Authentication (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved.ONT v Web Authentication (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved.ONT v x Authentication

© 2006 Cisco Systems, Inc. All rights reserved.ONT v x Authentication Microsoft Windows XP clients support only 40-bit or 104-bit dynamic WEP keys.

© 2006 Cisco Systems, Inc. All rights reserved.ONT v WPA with 802.1x This example shows WPA with dynamic keys.

© 2006 Cisco Systems, Inc. All rights reserved.ONT v WPA2 This example shows WPA2 with dynamic keys.

© 2006 Cisco Systems, Inc. All rights reserved.ONT v Summary Configuration is done using a GUI. Guest or hot-spot access can deploy open or web authentication. Basic security can be implemented with static WEP. Improved security results when you use WPA or WPA2 using preshared keys or dynamic 802.1x.

© 2006 Cisco Systems, Inc. All rights reserved.ONT v