1 / 26

Estableciendo un WLAN

Estableciendo un WLAN. COMP 417. Comunicación con el AP. Conección al WLAN. Site Information. Identificador del network. Wireless mode. Canal de comunicación. Modo de seguridad. MAC Address. Monitoreo. Status del network. Right-click sobre el icono del network.

yin
Download Presentation

Estableciendo un WLAN

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Estableciendo un WLAN COMP 417

  2. Comunicación con el AP

  3. Conección al WLAN

  4. Site Information Identificador del network Wireless mode Canal de comunicación Modo de seguridad MAC Address

  5. Monitoreo Status del network

  6. Right-click sobre el icono del network

  7. Solucionando problemas de conección

  8. Conectando el host al network

  9. Status del network

  10. Status del network

  11. Status del network

  12. Falta de connección

  13. Pasos para lograr establecer conección con el Access Point (AP)

  14. Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by the key of 10 or 26 hexadecimal digits, is widely in use and is often the first security choice presented to users by router configuration tools 802.11i (WPA and WPA2) The recommended solution to WEP security problems is to switch to WPA2. WPA was an intermediate solution for hardware that could not support WPA2, but it has been cracked. Both WPA and WPA2 are much more secure than WEP. To add support for WPA or WPA2, some old Wi-Fi access points might need to be replaced or have their firmware upgraded. WPA was designed as an interim software-implementable solution for WEP that could forestall immediate deployment of new hardware. However, TKIP (the basis of WPA) has reached the end of its designed lifetime, has been broken, and has been deprecated in the next full release of the 802.11 standard.

  15. WEP (Wired Equivalent Privacy ) • Although its name implies that it is as secure as a wired connection, WEP has been demonstrated to have numerous flaws and has been deprecated in favor of newer standards such as WPA2. In 2003 the Wi-Fi Alliance announced that WEP had been superseded by Wi-Fi Protected Access (WPA).

  16. TKIP • Temporal Key Integrity Protocol or TKIP is a security protocol used in the IEEE 802.11 wireless networking standard. TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance as a solution to replace WEP without requiring the replacement of legacy hardware. This was necessary because the breaking of WEP had left WiFi networks without viable link-layer security, and a solution was required for already deployed hardware.

  17. Advanced Encryption Standard • Advanced Encryption Standard process, the process used in choosing an algorithm for standardization as AES

  18. Firewalls • A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. • Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.

More Related