8/13/2019 Tutorial About Wireless cisco modul ke 5
1/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
Cisco Confidential 2011 Cisco and/or its affiliates. All rights reserved. 1
Module 5:Wireless
8/13/2019 Tutorial About Wireless cisco modul ke 5
2/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Jaringan tanpa kabel sebenarnya tidak sesulit sistem cable networkbahkan lebih mudah. Sistem jaringan WIFI atau Wireless tidakmemerlukan penghubung cable network antar computer.
Keuntungan dari sistem WIFI , pemakai tidak dibatasi ruang gerak
dan hanya dibatasi pada jarang jangkauan dari satu titik pemancarWIFI. Untuk jarak pada sistem WIFI mampu menjangkau area100feet atau 30M radius. Selain itu dapat diperkuat denganperangkat khusus seperti booster yang berfungsi sebagai relayyang mampu menjangkau ratusan bahkan beberapa kilometer ke
satu arah (directional).
8/13/2019 Tutorial About Wireless cisco modul ke 5
3/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
8/13/2019 Tutorial About Wireless cisco modul ke 5
4/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
8/13/2019 Tutorial About Wireless cisco modul ke 5
5/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
8/13/2019 Tutorial About Wireless cisco modul ke 5
6/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Adhoc
Adhoc adalah sistem peer to peer, dalam arti satu computerdihubungkan ke 1 computer dengan saling mengenal SSID. Jaditerdapat 2 computer dengan perangkat WIFI dapat langsungberhubungan tanpa alat yang disebut access point mode.
8/13/2019 Tutorial About Wireless cisco modul ke 5
7/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Berbasis Infrastruktur / BSS (Basic set Service)Sistem Infra Structure membutuhkan sebuah perangkat khusus atau dapatdifungsikan sebagai Access point Mirip seperti Hub. Access Point inilahyang memberikan tanda apakah disuatu tempat memiliki jaringan WIFI dansecara terus menerus mentransmisikan namanya - Service Set IDentifier(SSID) dan dapat diterima oleh computer lain untuk dikenal.
8/13/2019 Tutorial About Wireless cisco modul ke 5
8/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Berbasis Infrastruktur / ESS (Extended set Service)
Sistem Infra Structure membutuhkan lebih dari sebuah perangkat khususatau dapat difungsikan sebagai Access point Mirip seperti Hub. AccessPoint inilah yang memberikan tanda apakah disuatu tempat memilikijaringan WIFI dan secara terus menerus mentransmisikan namanya -Service Set IDentifier (SSID) dan dapat diterima oleh computer lain untuk
dikenal.
8/13/2019 Tutorial About Wireless cisco modul ke 5
9/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
8/13/2019 Tutorial About Wireless cisco modul ke 5
10/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
8/13/2019 Tutorial About Wireless cisco modul ke 5
11/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
8/13/2019 Tutorial About Wireless cisco modul ke 5
12/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
8/13/2019 Tutorial About Wireless cisco modul ke 5
13/33 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Wireless LAN security issues
The progession of WLAN security standard:
Wired Equivalent PrivacyWEP
SSID cloaking and MAC Filtering
The Cisco interim solution between WEP and 802.11i
Wi-Fi Protected AccessWPA
IEEE 802.11i and WPA-2
8/13/2019 Tutorial About Wireless cisco modul ke 5
14/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
WLAN vulnerabilities and solutions
Vulnerability Solution
War drivers Strong authentication
Hackers stealing information in aWLAN Strong encryption
Hackers again access to the rest ofthe network
Strong authentication
Employee AP installation IDS, including Cisco SWAN
Rogue AP Strong authentication, IDS/SWAN
8/13/2019 Tutorial About Wireless cisco modul ke 5
15/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
WEP
Basicencryption
No strongauthentication
Static,breakable keys
Not scalable
MAC filters andSSID-cloakingalso used tocomplementWEP
1997 2001
802.1x EAP
Dynamic keys
Improvedencryption
Userauthentication
802.1X EAP(LEAP, PEAP)
RADIUS
2003
WPA
Standardized
Improvedencryption
Strong, userauthentication(such as, LEAP,PEAP, EAP-FAST)
2004 to Present
802.11i / WPA2
AES strongencryption
Authentication
Dynamic keymanagement
8/13/2019 Tutorial About Wireless cisco modul ke 5
16/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16Cisco Confidential 2011 Cisco and/or its affiliates. All rights reserved. 16
Module 5:IPv6
8/13/2019 Tutorial About Wireless cisco modul ke 5
17/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Internet Users or PC
~530 million users in Q2 CY2002, ~945 million by 2004(Source: Computer Industry Almanac)
Emerging population/geopolitical and Address space
PDA, Pen-Tablet, Notepad,
~20 millions in 2004 Mobile phones
Already 1 billion mobile phones delivered by the industry
Transportation
1 billion automobiles forecast for 2008
Internet access in Planes
Consumer devices
Billions of Home and Industrial Appliances
8/13/2019 Tutorial About Wireless cisco modul ke 5
18/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
8/13/2019 Tutorial About Wireless cisco modul ke 5
19/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
8/13/2019 Tutorial About Wireless cisco modul ke 5
20/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
8/13/2019 Tutorial About Wireless cisco modul ke 5
21/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
8/13/2019 Tutorial About Wireless cisco modul ke 5
22/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Global Route Aggregation for Efficient Routing
Conventions for Representing IPv6 Addresses
Convention for Writing IPv6 Prefixes Global Unicast Prefix Assignment Example
Subnetting Global Unicast IPv6 AddressesInside an Enterprise
Prefix Terminology
8/13/2019 Tutorial About Wireless cisco modul ke 5
23/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
8/13/2019 Tutorial About Wireless cisco modul ke 5
24/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
8/13/2019 Tutorial About Wireless cisco modul ke 5
25/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
IPv6 prefixes represent a range or block of consecutive IPv6
addresses, the number that represent the range of addresses,called a Prefix
IPv6 classless and classfull addressing, and IPv6 addressing
8/13/2019 Tutorial About Wireless cisco modul ke 5
26/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
8/13/2019 Tutorial About Wireless cisco modul ke 5
27/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
8/13/2019 Tutorial About Wireless cisco modul ke 5
28/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
8/13/2019 Tutorial About Wireless cisco modul ke 5
29/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
IPv6 Address format with interface ID and EUI-64
8/13/2019 Tutorial About Wireless cisco modul ke 5
30/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
IPv4/IPv6 Dual StacksThe term dual stack means that the host or routeruses both IPv4 and IPv6 at the same time. The dualstack approach can be a reasonable plan of attack to
migrate an enterprise to IPv6 for communicationinside the enterprise
Tunneling
Another tool to support the IPv4-to-IPv6 transition isTunneling
8/13/2019 Tutorial About Wireless cisco modul ke 5
31/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Example IPv6-to-IPv4 tunnel, Physical and Logical View
8/13/2019 Tutorial About Wireless cisco modul ke 5
32/33
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
8/13/2019 Tutorial About Wireless cisco modul ke 5
33/33
Thank you.