US Robotics USR2450 Technické informace

Procházejte online nebo si stáhněte Technické informace pro Přístupové body WLAN US Robotics USR2450. US Robotics USR2450 Technical information Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 106
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
1
Practical Wireless IP:
Concepts, Administration, and Security
Brad C. Johnson &
Philip Cox
SystemExperts Corporation
V 2.2 Copyright SystemExperts 2001,2002,2003
2
Just checking...
n This is a top level bullet
n This is the next level in
n this would be level 3
n this would be level 4
n Can you hear?
Check 1…2…3…Check
n Is it too hot?
Too cold?
Zobrazit stránku 0
1 2 3 4 5 6 ... 105 106

Shrnutí obsahu

Strany 1 - Practical Wireless IP:

1Practical Wireless IP: Concepts, Administration, and SecurityBrad C. Johnson &Philip CoxSystemExperts CorporationV 2.2 Copyright SystemExperts 2

Strany 2 - Course Objectives

10V 2.2 Copyright SystemExperts 2001,2002,200319Exposuresn Technology problemsn Theft of hardwaren Insecure configuration informationn Masqueradingn

Strany 3 - What is Wireless

100V 2.2 Copyright SystemExperts 2001,2002,2003199Building your own AP (cont.)n Operating Systemn A Unix-like operating systemn Linux and FreeBSD see

Strany 4 - Wireless Devices

101V 2.2 Copyright SystemExperts 2001,2002,2003201Directions (cont.)n Update the kerneln Enable loadable module supportn Enable support for your othe

Strany 5 - General Purpose Devices

102V 2.2 Copyright SystemExperts 2001,2002,2003203Directions (cont.)n Configure wireless IP optionsn /etc/pcmcia/network.optsn Use private IP rangen

Strany 6 - FH, DS, IR, CCK(b), OFDM(a)

103V 2.2 Copyright SystemExperts 2001,2002,2003205Floppy based Wireless Gatewayn Same basic hardware requirementsn System, ISA-PCMCIA, NIC, Wireless

Strany 7 - Physical Layer

104V 2.2 Copyright SystemExperts 2001,2002,2003207WFG Internals (cont.)n IP Filteringn OpenBSD's IPF softwaren IP routing is enabledn Packet fil

Strany 8 - 802.11b IBSS

105V 2.2 Copyright SystemExperts 2001,2002,2003209Notes:V 2.2 Copyright SystemExperts 2001,2002,2003210Notes:

Strany 9 - 802.11b ESS

106Philip [email protected] direct530-887-9253 fax978-440-9388 mainhttp://www.SystemExperts.com/Brad C. JohnsonVice

Strany 10 - Technology Problems

11V 2.2 Copyright SystemExperts 2001,2002,200321Theft of hardwaren Wireless stuff is smalln Wireless cards fit in a shirt-pocketn Most of the APs fit

Strany 11 - Theft of hardware

12V 2.2 Copyright SystemExperts 2001,2002,200323Lucent Client Registry EntriesObfuscated or encryptedWEP KeySSIDV 2.2 Copyright SystemExperts 2001,2

Strany 12 - Registry Permissions

13V 2.2 Copyright SystemExperts 2001,2002,200325Masqueradingn Client siden AP identifies system, not usern System may be used by more than one usern

Strany 13 - Masquerading

14V 2.2 Copyright SystemExperts 2001,2002,200327Eavesdroppingn Indirect: listening to the network that the wireless access point is connected to (PRO

Strany 14 - MAC Layer

15V 2.2 Copyright SystemExperts 2001,2002,200329MAC address configurationLV 2.2 Copyright SystemExperts 2001,2002,200330Notes:

Strany 15 - MAC address configuration

16V 2.2 Copyright SystemExperts 2001,2002,200331Notes:V 2.2 Copyright SystemExperts 2001,2002,200332Notes:

Strany 16

17V 2.2 Copyright SystemExperts 2001,2002,200333Where are We?n From 50,000’ to 5’n Handheld Practicalsn LAN Practicalsn *NIX and Wireless n Currentsn

Strany 17 - Section Contents

18V 2.2 Copyright SystemExperts 2001,2002,200335Key Factors in Technologyn Regulationn Determines who gets what and hown In US “competition” was king

Strany 18 - Cellular Basics

19V 2.2 Copyright SystemExperts 2001,2002,200337Major Cellular Systemsn Advanced Mobile Phone System (AMPS)n IS-54/IS-136n IS-95n Global System for M

Strany 19 - Major Cellular Systems

2V 2.2 Copyright SystemExperts 2001,2002,20033Course Contentsn What is isn Wireless, focused onn IP services for laptopsn and a little on handheld an

Strany 20 - Today’s Data Systems

20V 2.2 Copyright SystemExperts 2001,2002,200339GSM Securityn International Mobile Equipment Identity (IMEI) for each device to determine if device i

Strany 21 - CDPD Security

21V 2.2 Copyright SystemExperts 2001,2002,200341CDPDn IS-732n Uses idle voice channel or dedicated data channel depending on network configurationn I

Strany 22 - What is 3G?

22V 2.2 Copyright SystemExperts 2001,2002,200343Other Popular Systemsn Cingular (a.k.a. Mobitex)n Operated by Bell South and RAM Mobile Datan Data up

Strany 23 - Observations

23V 2.2 Copyright SystemExperts 2001,2002,200345In a box …14.4kVerizon, Sprint PCS, Bell Mobility & Clearnet PCS, Airtouch, GTE, Bell Atlantic,

Strany 24 - Mobile Data Services

24V 2.2 Copyright SystemExperts 2001,2002,200347Section Contentsn Transportsn Mobile Data ServicesV 2.2 Copyright SystemExperts 2001,2002,200348Mobi

Strany 25 - Popular delivery standards

25V 2.2 Copyright SystemExperts 2001,2002,200349Mobile Data Services: Messagingn Short Messaging Service (SMS)n Available on all digital technologies

Strany 26 - Web Clipping

26V 2.2 Copyright SystemExperts 2001,2002,200351C-HTMLn Created by W3Cn Simplified version of HTMLn Heavily used in Japan via i-mode servicen Virtual

Strany 27

27V 2.2 Copyright SystemExperts 2001,2002,200353Wireless Application Protocol (WAP)n An application environmentn A set of communication protocols for

Strany 28 - The Gap in WAP

28V 2.2 Copyright SystemExperts 2001,2002,200355WAP Protocol LayersWireless Application Environment (WAE)ApplicaitonWireless Session Protocol (WSP)Se

Strany 29 - Gap in WAP

29V 2.2 Copyright SystemExperts 2001,2002,200357Gap in WAPWAP Gateway ClientWTLSSSLWTLSSSLEncrypt DecryptPlain TextHTTP SERVERV 2.2 Copyright System

Strany 30 - What Really Matters?

3V 2.2 Copyright SystemExperts 2001,2002,20035Where are We?n From 50,000’ to 5’ in about 24 slidesn Threatsn Handheld Practicalsn LAN Practicalsn

Strany 31

30V 2.2 Copyright SystemExperts 2001,2002,200359What Really Matters?n Securityn Encryption options by…n the Bearern the Applicationn WTLSn Device cos

Strany 32 - Upcoming WLAN

31V 2.2 Copyright SystemExperts 2001,2002,200361Where are We?n From 50,000’ to 5’n Handheld Practicalsn LAN Practicalsn *NIX and Wireless n Currentsn

Strany 33 - 802.11b Components

32V 2.2 Copyright SystemExperts 2001,2002,200363Wireless LAN Technologiesn Made up of three primary semi-competing technologiesn IEEE 802.11 {802.11b

Strany 34 - Current 802.11 Security

33V 2.2 Copyright SystemExperts 2001,2002,200365802.11 Local Area Wirelessn IEEE 802.11 makes up the majority of Wireless LANsn 802.11b (a.k.a. Wi-Fi

Strany 35 - Access Points and WEP

34V 2.2 Copyright SystemExperts 2001,2002,200367Current 802.11 Securityn Privacyn Wired Equivalent Privacy (WEP)n Authenticationn Shared keyn Open sy

Strany 36 - WEP Encryption

35V 2.2 Copyright SystemExperts 2001,2002,200369More on WEP Keysn Standard says 40bit, but many vendors support or 128 bitn 40bit is actually 64bit:

Strany 37 - WEP Decryption

36V 2.2 Copyright SystemExperts 2001,2002,200371WEP Encryption Stepsn Integrity Check Value computedn Checksum of payload (i.e., plaintext) using CRC

Strany 38 - WEP Key Management

37V 2.2 Copyright SystemExperts 2001,2002,200373WEP Decryption Stepsn Use key number to get private keyn Use sent IV to generate keystreamn RC4(IV,Ke

Strany 39 - The Major WEP Problems

38V 2.2 Copyright SystemExperts 2001,2002,200375128-bit Version (WEP2)n Stronger Keyn Non-standard, but in wide usen 104-bit key instead of 40-bit in

Strany 40 - Problem: Keystream Reuse

39V 2.2 Copyright SystemExperts 2001,2002,200377The Major WEP Problemsn Key Generatorsn Keystream Reusen RC4 Key Scheduling Algorithmn Message Authen

Strany 41 - -- as key length increases

4V 2.2 Copyright SystemExperts 2001,2002,20037Wireless Component OverviewPSTNWiredNetworkGateway802.11PDAWEBWAPAPPServerGatewayThis CourseThis Course

Strany 42 - Current Status of WEP

40V 2.2 Copyright SystemExperts 2001,2002,200379Problem: Keystream Reusen The shared key is static and rarely changedn Randomness of key stream depen

Strany 43 - Current Status of WEP (cont)

41V 2.2 Copyright SystemExperts 2001,2002,200381Problem: Key Scheduling Algorithm of RC4n Documented by Scott Fluhrer, Itsik Mantin and Adi Shamirn P

Strany 44 - Current 802.11 Authorization

42V 2.2 Copyright SystemExperts 2001,2002,200383Problem: Message Authenticationn The Cyclical Redundancy Check (CRC) chosen for the authentication is

Strany 45 - Wireless EAP: Cisco’s Version

43V 2.2 Copyright SystemExperts 2001,2002,200385Current Status of WEP (cont)n Use AES vice RC4n 802.1X rekey be accepted as normative textn “WEP2” to

Strany 46

44V 2.2 Copyright SystemExperts 2001,2002,200387Other 802.11b Authentication Mechanismsn Closed network (no broadcast SSID)n Enhanced Security Networ

Strany 47 - Let’s take a look…J

45V 2.2 Copyright SystemExperts 2001,2002,200389ESN: The Wireless Security Future?n Defined in the 802.11 Security Baseline n Depends on 802.1Xn Prot

Strany 48

46V 2.2 Copyright SystemExperts 2001,2002,200391Future 802.11 Security Enhancementsn Standard 128-bit WEP encryption (WEP2)n Already implemented by a

Strany 49 - Access Points 101

47V 2.2 Copyright SystemExperts 2001,2002,200393Let’s take a look…Jn 802.11b packetsn Beaconn Probe Requestn Open AuthenticationFC2 bytesCRC4 bytesDa

Strany 50 - Access Point Usage

48V 2.2 Copyright SystemExperts 2001,2002,200395Notes:V 2.2 Copyright SystemExperts 2001,2002,200396Notes:

Strany 51 - Access Point Placement

49V 2.2 Copyright SystemExperts 2001,2002,200397Section Contentsn 802.11n Access Points 101n Deployment ExamplesV 2.2 Copyright SystemExperts 2001,2

Strany 52 - Placement (cont.)

5V 2.2 Copyright SystemExperts 2001,2002,20039Single Function Device Migrationn Handheldn Cellular Phonen voice and datan increasing speedsn more com

Strany 53 - Capacity and Bandwidth

50V 2.2 Copyright SystemExperts 2001,2002,200399Frequency Overlap1 6 111098754322400 2500Frequency (US)Channels start at 2414MHz, increase by 5MHz, a

Strany 54 - Bandwidth Aggregation

51V 2.2 Copyright SystemExperts 2001,2002,2003101Extension PointWireless Extension PointRangeV 2.2 Copyright SystemExperts 2001,2002,2003102Access P

Strany 55 - Anatomy of 802.11b: the bits

52V 2.2 Copyright SystemExperts 2001,2002,2003103Placement (cont.)V 2.2 Copyright SystemExperts 2001,2002,2003104Placement (cont.)n Developing confi

Strany 56 - Anatomy of 802.11b: the wave

53V 2.2 Copyright SystemExperts 2001,2002,2003105Placement, 3 DimensionalV 2.2 Copyright SystemExperts 2001,2002,2003106Capacity and Bandwidthn Maxi

Strany 57 - Congestion (cont.)

54V 2.2 Copyright SystemExperts 2001,2002,2003107Capacity and Bandwidth (cont.)n Stays “higher” because ofn Reducing size of coverage areasn Reducing

Strany 58 - Hidden Node Problem

55V 2.2 Copyright SystemExperts 2001,2002,2003109Anatomy of 802.11bn Looking at some of the guts of the protocol to help us understand:n Modulation d

Strany 59 - Finding those Hidden Nodes

56V 2.2 Copyright SystemExperts 2001,2002,2003111Anatomy of 802.11b: the waven …then the wireless radio generates a 2.4 GHz wave and modulates it…n 1

Strany 60 - What Does This Mean?

57V 2.2 Copyright SystemExperts 2001,2002,2003113Congestion (cont.)n Each station listens to the networkn 1ststation to finish it’s allocated slot ti

Strany 61 - Roaming (cont.)

58V 2.2 Copyright SystemExperts 2001,2002,2003115Anatomy of 802.11b: Hidden Node Problemn AP P sees A, B, and C, but A and C can’t see each other (s

Strany 62 - Roaming Activities

59V 2.2 Copyright SystemExperts 2001,2002,2003117Hidden Node Problem: Let’s try it againn 802.11n basically designed for indoor, relatively short dis

Strany 63 - IEEE IAPP

6V 2.2 Copyright SystemExperts 2001,2002,200311802.11bn Unlicensed 2.4 GHz band n Uses direct-sequence spread-spectrum (DSSS)n Frequency-Hopping FHSS

Strany 64 - Wi-FI Roaming (cont.)

60V 2.2 Copyright SystemExperts 2001,2002,2003119Surprising Resultswith RTS/CTSPollingWhat does this mean?In certain circumstances, the method used m

Strany 65 - Access Point Medicine

61V 2.2 Copyright SystemExperts 2001,2002,2003121Anatomy of 802.11b: Roamingn More than 1 AP providing signals to a single clientn The client is resp

Strany 66

62V 2.2 Copyright SystemExperts 2001,2002,2003123Important Concepts: Strength vs. Qualityn Received Signal Strength n Signal energy at the location o

Strany 67 - Wireless at Home

63V 2.2 Copyright SystemExperts 2001,2002,2003125IEEE IAPPn Accomplishes roaming within a subnetn Basically, within a corporate wireless LANn 2 trans

Strany 68 - Industry Setup: Ariba

64V 2.2 Copyright SystemExperts 2001,2002,2003127Wi-FI Roaming (cont.)n 802.11bn Boot up with correct SSID for Wi-Fi networkn Local WISP login screen

Strany 69 - Architectural Considerations

65V 2.2 Copyright SystemExperts 2001,2002,2003129Configuring an Access Pointn How to manage itn HTTP, Telnet, SNMP or Serial Interfacen Security Sett

Strany 70

66V 2.2 Copyright SystemExperts 2001,2002,2003131Notes:V 2.2 Copyright SystemExperts 2001,2002,2003132Notes:

Strany 71 - Linux Wireless RF Sniffer

67V 2.2 Copyright SystemExperts 2001,2002,2003133Section Contentsn 802.11n Access Points 101n Deployment ExamplesV 2.2 Copyright SystemExperts 2001,

Strany 72 - How-To (cont.)

68V 2.2 Copyright SystemExperts 2001,2002,2003135Wireless at a Conferencen Goalsn Reduce time to setup fully functional temporary network resourcesn

Strany 73 - AirSnort

69V 2.2 Copyright SystemExperts 2001,2002,2003137CyberCafen Typically an Open APn Use a captive portal to allow accessn Costlyn Starbucks is one of t

Strany 74 - Building your own AP

7V 2.2 Copyright SystemExperts 2001,2002,200313802.11bn Physical Layern Physical Medium Dependent (PMD) –wireless encodingn Physical Layer Convergenc

Strany 75 - My Problems

70V 2.2 Copyright SystemExperts 2001,2002,2003139Notes:V 2.2 Copyright SystemExperts 2001,2002,2003140Notes:

Strany 76 - My Observations

71V 2.2 Copyright SystemExperts 2001,2002,2003141Where are We?n From 50,000’ to 5’n Handheld Practicalsn LAN Practicalsn *NIX and Wirelessn Currentsn

Strany 77 - How Does it Work?

72V 2.2 Copyright SystemExperts 2001,2002,2003143Linux Sniffer: How-ToDirections at Tim Newsham’s site http://www.lava.net/~newsham/wlann Get an SMC2

Strany 78

73V 2.2 Copyright SystemExperts 2001,2002,2003145Sniffer Observationsn It works! Its Linux! Its free!n Only one channel at a time Ln You can write a

Strany 79 - IEEE 802.11a

74V 2.2 Copyright SystemExperts 2001,2002,2003147Home Spun Access Pointn What is itn A system that gateways between the wireless and wired networksn

Strany 80 - 1W5.725-5.825

75V 2.2 Copyright SystemExperts 2001,2002,2003149Directions (cont.)n Harden the rest of the system (read: TURN OFF ALL UNUSED SERVICES)n Keep the PCM

Strany 81 - 802.11a Coverage Graphic

76V 2.2 Copyright SystemExperts 2001,2002,2003151My Observationsn Functionality is limited in some instancesn IBSS onlyn WLAN-NG supposedly supports

Strany 82 - 802.11 Thoughts

77V 2.2 Copyright SystemExperts 2001,2002,2003153OpenAPn OpenAP http://opensource.instant802.com/n Open-source softwaren Fully 802.11b compliant wire

Strany 83

78V 2.2 Copyright SystemExperts 2001,2002,2003155Notes:V 2.2 Copyright SystemExperts 2001,2002,2003156Notes:

Strany 84 - Antennas: The Skinny

79V 2.2 Copyright SystemExperts 2001,2002,2003157Where are We?n From 50,000’ to 5’n Handheld Practicalsn LAN Practicalsn *NIX and Wireless n Currents

Strany 85 - Antennas: Basics (cont.)

8V 2.2 Copyright SystemExperts 2001,2002,200315802.11b Frame Controln 3 types of 802.11b packetsn Management (type 00)n {association, re-association,

Strany 86 - Dipole Radiation

80V 2.2 Copyright SystemExperts 2001,2002,2003159802.11a Spectrumn 3 primary non-contiguous bandsn 100MHz each band with power restrictionsn split in

Strany 87 - Directional Radiation: Biquad

81V 2.2 Copyright SystemExperts 2001,2002,2003161802.11a Coveragen 802.11a signals lose strength more quicklyn Higher frequencies lose power more qui

Strany 88 - Typical PCMCIA Radiation

82V 2.2 Copyright SystemExperts 2001,2002,2003163802.11a Problemsn Use of 5 GHz band will cause contention in different parts of the worldn Remember

Strany 89 - Antennas: More Facts (cont.)

83V 2.2 Copyright SystemExperts 2001,2002,2003165Notes:V 2.2 Copyright SystemExperts 2001,2002,2003166Notes:

Strany 90

84V 2.2 Copyright SystemExperts 2001,2002,2003167Where are We?n From 50,000’ to 5’n Handheld Practicalsn LAN Practicalsn *NIX and Wireless n Currents

Strany 91

85V 2.2 Copyright SystemExperts 2001,2002,2003169Antennas: Basicsn A radiation pattern is a diagram that allows us to visualize in what directions th

Strany 92 - Thanks to …

86V 2.2 Copyright SystemExperts 2001,2002,2003171Antennas: Dipolen Most common antenna and the default type on most APsn Usually a 1-inch radiating e

Strany 93 - References (cont.)

87V 2.2 Copyright SystemExperts 2001,2002,2003173Antennas: Directionaln Directional antenna concentrate their energy into a conen Known as a beamn Ra

Strany 94

88V 2.2 Copyright SystemExperts 2001,2002,2003175Antennas: PCMCIA Cardsn Their terrible, awful, did I mention yuck?n It’s hard to form antennas onto

Strany 95 - Mailing Lists

89V 2.2 Copyright SystemExperts 2001,2002,2003177Antennas: More Factsn Constant trade-off of range and throughputn Remember that the “low” speed of 1

Strany 96 - Glossary (cont.)

9V 2.2 Copyright SystemExperts 2001,2002,200317802.11b BSSn Basic Service Set (BSS)n Infrastructure moden Uses an AP to connect clients to a wired ne

Strany 97 - Glossary(cont.)

90V 2.2 Copyright SystemExperts 2001,2002,2003179Notes:V 2.2 Copyright SystemExperts 2001,2002,2003180Notes:

Strany 98 - End Matter

91V 2.2 Copyright SystemExperts 2001,2002,2003181Reviewn Why is it basically impossible to get full 2, 5.5, or 11 Mbps?n What’s the common management

Strany 99 - Apple Airport

92V 2.2 Copyright SystemExperts 2001,2002,2003183The Endn Thank you for attending!n Thank you for your comments!n Please fill out the Instructor Eval

Strany 100 - Building your own AP (cont.)

93V 2.2 Copyright SystemExperts 2001,2002,2003185Referencesn Access Pointsn www.cisco.com/warp/public/cc/pd/witc/ao340ap/n www.apple.com/airport/spec

Strany 101 - Directions (cont.)

94V 2.2 Copyright SystemExperts 2001,2002,2003187References (cont.)n Reference materialn www.cmu.edu/computing/wireless/index.htmln www.teleport.com/

Strany 102

95V 2.2 Copyright SystemExperts 2001,2002,2003189Wireless Stuffn Wireless performance articlen www.networkcomputing.com/1113/1113f2full.htmln IEEE 80

Strany 103 - WFG Internals

96V 2.2 Copyright SystemExperts 2001,2002,2003191Glossary3G (third generation) An industry term used to describe the next, still-to-come generation o

Strany 104 - WFG Internals (cont.)

97V 2.2 Copyright SystemExperts 2001,2002,2003193Glossary(cont.)GPRS (general packet radio service) A technology that sends packets of data across a

Strany 105

98V 2.2 Copyright SystemExperts 2001,2002,2003195Glossary(cont.) WCDMA (wideband CDMA) A third-generation wireless technology under development that

Strany 106 - Philip Cox

99V 2.2 Copyright SystemExperts 2001,2002,2003197Apple AirportGold 128 bit cardSilver 64 bit cardV 2.2 Copyright SystemExperts 2001,2002,2003198Buil

Komentáře k této Příručce

Žádné komentáře