cwna certified wireless network administrator study guide exam

594 669 0
cwna certified wireless network administrator study guide exam

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

cwna certified wireless network administrator study guide exam

CWNA ® Certified Wireless Network Administrator™ Study Guide David D Coleman David A Westcott Wiley Publishing, Inc CWNA ® Certified Wireless Network Administrator™ Study Guide CWNA ® Certified Wireless Network Administrator™ Study Guide David D Coleman David A Westcott Wiley Publishing, Inc Acquisitions and Development Editor: Jeff Kellum Technical Editor: Sam Coyl Production Editor: Martine Dardignac Copy Editor: Judy Flynn Production Manager: Tim Tate Vice President and Executive Group Publisher: Richard Swadley Vice President and Executive Publisher: Joseph B Wikert Vice President and Publisher: Neil Edde Permissions Editor: Shannon Walters Media Development Specialist: Kate Jenkins Book Designers: Judy Fung and Bill Gibson Compositor: Laurie Stewart, Happenstance Type-O-Rama Illustrator: Jeffrey Wilson, Happenstance Type-O-Rama Proofreader: Nancy Riddiough Indexer: Nancy Guenther Cover Designer: Ryan Sneed Copyright © 2006 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN-13: 978-0-471-78952-9 ISBN-10: 0-471-78952-6 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600 Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose No warranty may be created or extended by sales or promotional materials The advice and strategies contained herein may not be suitable for every situation This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services If professional assistance is required, the services of a competent professional person should be sought Neither the publisher nor the author shall be liable for damages arising herefrom The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S at (800) 762-2974, outside the U.S at (317) 572-3993 or fax (317) 572-4002 Wiley also publishes its books in a variety of electronic formats Some content that appears in print may not be available in electronic books Library of Congress Cataloging-in-Publication Data is available from the publisher TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc and/or its affiliates, in the United States and other countries, and may not be used without written permission CWNA and Certified Wireless Network Administrator are trademarks or registered trademarks of Planet3 Wireless, Inc in the United States and other countries All other trademarks are the property of their respective owners Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book 10 To Our Valued Readers: Thank you for looking to Sybex for your CWNA exam prep needs We at Sybex are proud of our reputation for providing certification candidates with the practical knowledge and skills needed to succeed in the highly competitive IT marketplace Certification candidates have come to rely on Sybex for accurate and accessible instruction on today’s crucial technologies and business skills Just as Planet3 is committed to establishing measurable standards for certifying IT wireless administration professionals by means of the CWNA certification, Sybex is committed to providing those individuals with the knowledge needed to meet those standards The authors and editors have worked hard to ensure that this edition of the CWNA: Certified Wireless Network Administrator Study Guide you hold in your hands is comprehensive, in-depth, and pedagogically sound We’re confident that this book will exceed the demanding standards of the certification marketplace and help you, the CWNA certification candidate, succeed in your endeavors As always, your feedback is important to us If you believe you’ve identified an error in the book, please send a detailed e-mail to support@wiley.com And if you have general comments or suggestions, feel free to drop me a line directly at nedde@wiley.com At Sybex we’re continually striving to meet the needs of individuals preparing for certification exams Good luck in pursuit of your CWNA certification! Neil Edde Vice President & Publisher Wiley Publishing, Inc We would like to dedicate this book to our parents, teachers, instructors, and mentors, who have helped us throughout our lives We hope that through this book and through our teaching and mentoring we can help others achieve their goals Acknowledgments David Coleman would like to thank his children, Brantley and Carolina, for their patience and understanding of their father throughout the writing of the book I love you kids very much David Westcott would like to thank his wife, Gina, for her patience, understanding, and support and for the hours she spent reading and editing the book Writing the CWNA study guide has been a nine-month adventure that neither of us fully grasped from the start We would like to thank all of the following individuals for their support and contributions during the entire process We must first thank Acquisitions and Developmental Editor Jeff Kellum of Sybex Publishing for initially finding us and bringing us on to this project Jeff is an extremely patient and understanding editor who, despite our best efforts, needed to send us an occasional nasty e-mail message We would also like to thank Project Editor Martine Dardignac of Wiley Martine was an absolute pleasure to work with despite the fact that we drove her crazy We would also love to thank our copyeditor, Judy Flynn; our proofreader, Nancy Riddiough; the illustrators; and our media development specialist, Shannon Walters We need to give a big shout out to our technical editor, Sam Coyle Sam is a member of the IEEE with many years of practical experience in wireless communications His contributions to the book were nothing short of invaluable When Sam is not providing awesome technical editing, he is vice president of business development for Kandersteg\Netrepid (www.netrepid.com), a wireless solutions provider We would also like to thank Devin Akin, Kevin Sandlin, Scott Turner, and Scott Williams of the CWNP Program (www.cwnp.com) You gentlemen should be proud of the internationally renowned wireless certification program that you have developed It has been a pleasure working with all of you the past four years Thanks to Proxim and to Ken Ruppel (kenruppel@gmail.com) for allowing us to include the video “Beam Patterns and Polarization of Directional Antennas” on the CD-ROM, and thanks to Andrew Potter for making himself available for our photography needs Special thanks goes to Andras Szilagyi, not only for creating the EMANIM software program, but also for all the extra assistance he provided by working with us to create a customized version of the program for the CD-ROM We would also like to think the following individuals and companies for their contributions to the book: • Air Defense—Nico Darrow, Ralf Deltrap, and Bryan Harkins (www.airdefense.net) • Air Magnet—Jonathan Bass and Chia Chee Kuan (www.airmagnet.com) • AirWave (www.airwave.com) • Andrew Potter Photography—Andrew Potter (www.andrewpotterphotography.com) • Aruba Networks—Christopher Leach (www.arubanetworks.com) • Cognio—William Flanagan and Margo Schlossberg (www.cognio.com) • Cushcraft—Mark Miller (www.cushcraft.com) • D-Link—(www.dlink.com) • Ekahau—Jussi Kiviniemi (www.ekahau.com) • Fortress Technologies—Andrea Shirley and Joe Tomasone (www.fortresstech.com) Appendix Appendix Abbreviations and Acronyms Certifications CWAP Certified Wireless Analysis Professional CWNA Certified Wireless Network Administrator CWNE Certified Wireless Network Expert CWNP Certified Wireless Network Professional CWSP Certified Wireless Security Professional Organizations and Regulations ACA Australian Communications Authority ARIB Association of Radio Industries and Businesses (Japan) ATU African Telecommunications Union CEPT European Conference of Postal and Telecommunications Administration CITEL Inter-American Telecommunication Commission ERC European Radiocommunications Committee EWC Enhanced Wireless Consortium FCC Federal Communications Commission FIPS Federal Information Processing Standard GLBA Gramm-Leach-Bliley Act HIPAA Health Insurance Portability and Accountability Act IEEE Institute of Electrical and Electronics Engineers IETF Internet Engineering Task Force ISO International Organization for Standardization NEMA National Electrical Manufacturers Association NIST National Institute of Standards and Technologies RCC Regional Commonwealth in the field of Communications SEEMesh Simple, Efficient and Extensible Mesh TGn Sync Task Group n-Sync WECA Wireless Ethernet Compatibility Alliance Abbreviations and Acronyms WIEN Wireless InterWorking with External Networks WiMA Wi-Mesh Alliance WWiSE World-Wide Spectrum Efficiency Measurements dB Decibels dBd Decibels referenced to a dipole antenna dBi Decibels referenced to an isotropic radiator dBm Decibels referenced to one milliwatt GHz Gigahertz Hz Hertz KHz Kilohertz MHz Megahertz mW Milliwatt SNR Signal-to-noise ratio VDC Voltage direct current W Watt Technical Terms AAA authorization, authentication, and accounting AC alternating current ACK acknowledgement AES Advanced Encryption Standard AGL above ground level AID association identifier AKM Authentication and Key Management AM Amplitude Modulation AP access point ARS adaptive rate selection ARS automatic rate selection AS authentication server Appendix ASK Amplitude Shift Keying ATIM announcement traffic indication message BER bit error rate BSA basic service area BSS basic service set BSSID basic service set identifier BT Bluetooth BVI bridged virtual interface CAD computer aided design CAM continuous aware mode CCA clear channel assessment CCI co-channel interference CCK Complementary Code Keying CCMP Counter Mode with Cipher Block Chaining–Message Authentication Code Protocol CCX Cisco Compatible Extensions CF Compact Flash CF Contention Free CFP Contention-Free Period CP Contention Period CRC cyclic redundancy check CSMA/CA Carrier Sense Multiple Access/Collision Avoidance CSMA/CD Carrier Sense Multiple Access/Collision Detection CTS clear to send CW contention window DA destination address DBPSK Differential Binary Phase Shift Keying DC direct current DCF Distributed Coordination Function DFS dynamic frequency selection DHCP Dynamic Host Configuration Protocol Abbreviations and Acronyms DIFS Distributed Coordination Function interframe spacing DoS denial of service DQPSK Differential Quadrature Phase Shift Keying DRS dynamic rate shifting DRS dynamic rate switching DS distribution system DSM distribution system medium DSS distribution system services DSRC Dedicated Short Range Communications DSSS Direct Sequencing Spread Spectrum DTIM delivery traffic indication message EAP Extensible Authentication Protocol EDCAF Enhanced Distributed Channel Access Function EEG enterprise encryption gateway EIFS extended interframe spacing EIRP equivalent isotropically radiated power ERP-OFDM Extended Rate Physical Orthogonal Frequency Division Multiplexing ESA Extended Service Area ESS extended service set ESSID Extended Service Set Identifier EUI Extended Unique Identifier EWG enterprise wireless gateway FAST Fast Authentication Secure Tunnel FCS frame check Sequence FEC forward error correction FHSS frequency hopping spread spectrum FM Frequency Modulation FSK Frequency Shift Keying FSPL free space path loss FSR fast secure roaming Appendix FZ Fresnel zone GFSK Gaussian Frequency Shift Keying GMK Group Master Key GPS Global Positioning System GRE Generic Routing Encapsulation GTC Generic Token Card GTK Group Temporal Key HCCA Hybrid Coordination Function Controlled Access HCF Hybrid Coordination Function HR-DSSS High Rate Direct Sequencing Spread Spectrum HSRP Hot Standby Router Protocol HTTPS Hyper text Transfer Protocol Secure IAPP Inter Access Point Protocol IBSS independent basic service set ICMP Internet Control Message Protocol ICV Integrity Check Value IDS intrusion detection system IE Information Element IFS interframe space IP Internet Protocol IPSec Internet Protocol Security IR Infrared IR intentional radiator ISI Inter-symbol interference ISM Industrial, Scientific, and Medical ITS Intelligent Transportation Systems IV Initialization Vector L2TP Layer Tunneling Protocol LAN local area network LEAP Lightweight Extensible Authentication Protocol Abbreviations and Acronyms LOS Line of sight LWAPP Lightweight Access Point Protocol MAC Media Access Control MAHO Mobile Assisted Hand-Over MAN metropolitan area network MD5 Message Digest MIB Management Information Base MIC Message Integrity Check MIMO Multiple Input Multiple Output MPPE Microsoft Point-to-Point Encryption MTU maximum transmission unit NAT Network Address Translation NAV network allocation vector nQSTA Non-Quality of Service Station OFDM Orthogonal Frequency Division Multiplexing OSI model Open Systems Interconnection model OUI Organizationally Unique Identifier PAN personal area network PAT Port Address Translation PBCC Packet Binary Convolutional Coding PC point coordinator PCI Peripheral Component Interconnect PCF Point Coordination Function PCMCIA Personal Computer Memory Card International Association (PC Card) PD Powered Device PEAP Protected Extensible Authentication Protocol PHY Physical layer PIFS Point Coordination Function interframe spacing PMK Pairwise Master Key PN pseudorandom number Appendix PoE Power over Ethernet POP Post Office Protocol PPP Point-to-Point Protocol PPTP Point-to-Point Tunneling Protocol PS-Poll power save poll PSE Power Sourcing Equipment PSK Phase Shift Keying PSK preshared key PSP power save poll PSPF Public Secure Packet Forwarding PTK Pairwise Transient Key PtMP Point-to-MultiPoint PtP Point-to-Point QAP quality of service access point QBSS quality of service basic service set QoS quality of service QSTA quality of service station RA receiver address RADIUS Remote Authentication Dial-In User Service RBAC role-based access control RWG residential wireless gateway RF radio frequency RFC Request for Comments RFSM Radio Frequency Spectrum Management RSL received signal level RSN robust security network RSNA robust security network association RSSI receive signal strength indicator RTS request to send RTS/CTS request to send/clear to send Abbreviations and Acronyms RX receive or receiver SA source address SD Secure Digital SDR software defined radio SIFS short interframe spacing SMTP Simple Mail Transfer Protocol SNMP Simple Network Management Protocol SOHO small office, home office SOM system operating margin SSH Secure Shell SSID service set identifier SSL Secure Sockets Layer STA station STC Space Time Coding STP Spanning Tree Protocol TA transmitter address TBTT target beacon transmission time TCP/IP Transmission Control Protocol/Internet Protocol TIM traffic indication map TKIP Temporal Key Integrity Protocol TLS Transport Layer Security TPC transmit power control TSN transition security network TTLS Tunneled Transport Layer Security TX transmit or transmitter TXOP transmit opportunity UNII Unlicensed National Information Infrastructure USB Universal Serial Bus VLAN virtual local area network VoIP Voice over IP 10 VoWiFi Appendix Voice over Wi-Fi VoWIP Voice over Wireless IP VPN virtual private network VRRP Virtual Router Redundancy Protocol VSWR voltage standing wave ratio WAN wide area network WAVE Wireless Access and Vehicular Environment WDS Wireless Distribution System WEP Wired Equivalent Privacy WGB workgroup bridge Wi-Fi Wireless Fidelity WIDS wireless instruction detection system WIGLE Wireless Geographic Logging Engine WiMAX Worldwide Interoperability for Microwave Access WIPS wireless intrusion prevention system WISP Wireless Internet service provider WLAN wireless local area network WLSE Wireless LAN Solution Engine WM wireless medium WMAN wireless metropolitan area network WMM Wi-Fi Multimedia WMM–PS Wi-Fi Multimedia Power Save WMM–SA Wi-Fi Multimedia Scheduled Access WNMS Wireless Network Management System WPA Wi-Fi Protected Access WPAN wireless personal area network WPP Wireless Performance Prediction WWAN wireless wide area network WZC wireless zero configuration Power Regulations 11 Power Regulations The Federal Communications Commission (FCC) regulates communications to and from the United States The FCC and the respective controlling agencies in other countries regulate the amount of power at the intentional radiator (IR) and the amount of power radiated from the antenna (EIRP) for 802.11 radios Power output regulations are typically created to minimize interference within the band and to minimize interference to adjacent or nearby bands The rules regarding the amount of power that is permitted are typically divided into two categories: point-to-multipoint communications (PtMP), and point-to-point communications (PtP) The regulations for PtMP communications are generally more restrictive than the regulations for PtP communications The reasoning is fairly straightforward PtMP signals are generated in all directions, covering a broad area, and thus more likely to interfere with other devices PtP signals are focused using high-gain antennas, making the area of potential interference very small The following sections will review the FCC power regulations 2.4 GHz ISM Point-to-MultiPoint (PtMP) Communications PtMP communications consist of a central communications device communicating to multiple other devices If the central device is connected to an omni-directional antenna, the FCC automatically classifies the communications as PtMP The central PtMP device does not have to be connected to an omni-directional antenna, as is the case with many access points that are connected to semi-directional patch antennas The FCC limits the maximum power at the intentional radiator (IR) at watt (+30 dBm) and the maximum radiated power from the antenna (EIRP) at watts (+36 dBm) This means that if the IR is at the maximum power of watt, or 30 dBm, then the maximum gain antenna that can be used is dBm, which creates a total EIRP of 36 dBm or watts Remember that IR + antenna gain = EIRP No matter what you want to do, the EIRP cannot be greater than 36 dBm or watts This means that if you wanted to use a higher-gain antenna, you must subtract the antenna gain from the EIRP to calculate the maximum IR that you can have As an example, if you wanted to use a dBi patch antenna, the maximum IR would be 27 dBm or 500 mW (36 dBm – dBi = 27 dBm) For every dBi increase in the antenna above dBi, the IR must decrease by the same amount This is often known as the one-to-one or 1:1 rule GHz UNII Point-to-MultiPoint (PtMP) Communications The FCC PtMP rules for the GHz UNII bands follow the same basic rules of the 2.4 GHz ISM PtMP communications A dBi antenna can be connected to the PtMP device without affecting the maximum EIRP Any additional increase in antenna gain requires an equal decrease in IR Figures A.1 and A.2 show the maximum IR and EIRP values for the UNII bands in both the United States (FCC) and Europe (ERC) Appendix GHz PtMP—intentional radiator power regulations 40 mW intentional radiator 1,000 mW intentional radiator 5.470 GHz New 5.350 GHz Middle 5.250 GHz 5.150 GHz Lower 200 mW intentional radiator FCC and ERC require transmit power control (TPC) for systems over 500 mW EIRP Upper 5.825 GHz FIGURE A.1 5.725 GHz 12 FCC and ERC require dynamic frequency selection (DFS) for radar detection 5.825 GHz ERC: N/A Equivalent isotropically radiated power (EIRP) 5.725 GHz ERC: watt Upper 5.470 GHz New 5.350 GHz ERC: 200 mW Middle 5.250 GHz Lower 5.150 GHz ERC: 200 mW FCC: 200 mW + up to dBi antenna gain FCC: 200 mW + up to dBi antenna gain FCC: 1,000 mW IR + up to dBi antenna gain GHz PtMP—EIRP power regulations FCC: 40 mW IR + up to dBi antenna gain FIGURE A.2 Power Regulations 13 2.4 GHz ISM Point-to-Point (PtP) Communications Point-to-point communication consists of two devices communicating to each other using directional antennas The FCC PtP rules for the 2.4 GHz ISM band start with the same initial values as the PtMP rules: watt IR, dBi antenna, watt EIRP The maximum allowed IR is still watt; however, since the antenna is directional and only communicating with one other device, the FCC allows the antenna gain and the EIRP to be increased For every dB additional increase of the antenna (above the initial dBi value), the IR must be decreased by dB This is often known as the three-to-one or 3:1 rule Remember that IR + antenna gain = EIRP, so if the antenna is increased by dB and the IR is decreased by dB, then the EIRP is increased by dB To help understand the rule, just remember 3-2-1 A dB increase in the antenna creates a dB increase in the EIRP because it requires a dB decrease in the IR IR Antenna Gain Maximum EIRP +30 dBm (1 Watt) dBi +36 dBm (4 watts) +29 dBm dBi +38 dBm (6.3 watts) +28 dBm 12 dBi +40 dBm (10 watts) +27 dBm 15 dBi +42 dBm (16 watts) +26 dBm 18 dBi +44 dBm (25 watts) +25 dBm 21 dBi +46 dBm (39.8 watts) +24 dBm 24 dBi +48 dBm (63 watts) +23 dBm 27 dBi +50 dBm (100 watts) +22 dBm 30 dBi +52 dBm (158 watts) GHz UNII Point-to-Point (PtP) Communications The FCC PtP rules for the GHz UNII-1 and UNII-2 bands are identical to the PtMP rules for these bands For the UNII-3 band, the FCC has a separate set of rules since the UNII-3 band is often used for long-distance point-to-point communications A fixed PtP transmitter with a maximum IR of +30 dBm (1 watt) is allowed to be connected to a directional antenna with a gain of up to 23 dBi without making any change to the IR The maximum allowed EIRP is therefore +53 dBm (200 watts) For every dBi increase in the antenna above 23 dBi, the IR must decrease by the same amount So if you have any gain above the 23 dBi, you must adhere to the 1:1 rule CWNA: Certified Wireless Network Administrator Study Guide CWNA Exam Objectives OBJECTIVE CHAPTER Radio Frequency (RF) Technologies 1.1 RF Fundamentals 1.1.1 Define and explain the basic concepts of RF behavior 1.2 RF Mathematics 1.3 RF Signal and Antenna Concepts 1.3.1 Identify RF signal characteristics, the applications of basic RF antenna concepts, and the implementation of solutions that require RF antennas 1.3.2 Explain the applications of basic RF antenna types and identify their basic attributes, purpose, and function 1.3.3 Describe the proper locations and methods for installing RF antennas 1.4 RF Antenna Accessories 1.4.1 Identify the use of the following wireless LAN accessories and explain how to select and install them for optimal performance within FCC regulations: amplifiers, attenuators, lightning arrestors, grounding rods/wires, RF cables, RF connectors, RF signal splitters 802.11 Regulations and Standards 2.1 Spread Spectrum Technologies 2.1.1 Identify some of the uses for spread spectrum technologies 2.1.2 Comprehend the differences between the different types of spread spectrum technologies 2.1.3 Identify the underlying concepts of how spread spectrum technology works 2.1.4 Identify and apply the concepts that make up the functionality of spread spectrum technology 2.2 IEEE 802.11 Standard 2.2.1 Identify, explain, and apply the concepts covered by the IEEE 802.11 standard and the differences between the following 802.11 clauses: 802.11, 802.11a, 802.11b, 802.11d, 802.11e, 802.11f, 802.11g, 802.11h, 802.11i, 802.11j, 802.11n, 802.11r, 802.11s 2.3 802.11 Industry Organizations and Their Roles 2.3.1 Define the roles of the following organizations in providing direction, cohesion, and accountability within the wireless LAN industry: FCC, IEEE, Wi-Fi Alliance 802.11 Protocols and Devices 3.1 802.11 Protocol Architecture 3.1.1 Summarize the processes involved in authentication and association 3.1.2 Define, describe, and apply the following concepts associated with wireless LAN service sets: BSS and BSSID, ESS and ESSID/SSID, IBSS, Roaming, Infrastructure Mode, Ad Hoc Mode 3.1.3 Explain and apply the following power management features of wireless LANs: PSP Mode, CAM Mode, TIM/DTIM/ATIM 3.2 802.11 MAC & PHY Layer Technologies 3.2.1 Describe and apply the following concepts surrounding wireless LAN frames: 802.11 Frame Format vs 802.3 Frame Format; Layer-3 Protocol Support by 802.11 Frames 3.2.2 Identify methods described in the 802.11 standard for locating, joining, and maintaining connectivity with an 802.11 wireless LAN 3.2.3 Define, describe, and apply 802.11 modes and features available for moving data traffic across the RF medium OBJECTIVE CHAPTER 3.3 Wireless LAN Infrastructure and Client Devices 10 3.3.1 Identify the purpose of the following wireless LAN infrastructure devices and describe how to install, configure, secure, and manage them: Access Points, Wireless LAN Bridges, Wireless LAN Switches, PoE Injectors and PoE-enabled Switches, Residential Wireless Gateways, Enterprise Wireless Gateways, Enterprise Encryption Gateways, Wireless LAN Routers, Remote Office Wireless Switches, Wireless LAN Mesh Routers 3.3.2 Describe the purpose of the following wireless LAN client devices and explain how to install, configure, secure, and manage them: PCMCIA Cards; USB, CF, and SD Devices; Serial and Ethernet Converters; PCI and Mini-PCI Cards; Card Adapters; Wireless Workgroup Bridges 802.11 Network Implementation 4.1 802.11 Network Design, Implementation, and Management 11 4.1.1 Identify technology roles for which wireless LAN technology is appropriate 4.2 802.11 Network Troubleshooting 12 4.2.1 Identify and explain how to solve the following wireless LAN implementation challenges: Multipath, Hidden Nodes, Near/Far, Narrowband and Wideband RF Interference, System Throughput, Co-channel and Adjacentchannel Interference, weather 802.11 Network Security 5.1 802.11 Network Security Architecture 13 5.1.1 Identify and describe the strengths, weaknesses, appropriate uses, and appropriate implementation of the following 802.11 security-related items: Shared Key Authentication, Encryption Algorithms, Key Management Mechanisms, Access Control and Authentication 5.1.2 Describe the following types of wireless LAN security attacks, and explain how to identify and prevent them where possible: Eavesdropping, RF jamming (Denial of Service), Man-in-the-middle, Management Interface Exploits, Encryption Cracking, Hijacking 5.1.3 Describe, explain, and illustrate the appropriate applications for the following client-related wireless security solutions: Role-based Access Control, IPSec VPN, PPTP VPN, Profile-based firewalls, Captive Portal 5.1.4 Describe, explain, and illustrate the appropriate applications for the following wireless LAN system security and management features: Rogue AP detection and/or containment, SNMPv3/HTTPS/SSH 5.2 802.11 Network Security Analysis Systems, Devices 10 5.2.1 Identify the purpose and features of the following wireless analysis systems and explain how to install, configure, integrate, and manage them as applicable: handheld and laptop protocol analyzers, Distributed Wireless Intrusion Prevention Systems (WIPS), remote hardware and software sensors, handheld RF analyzers 5.3 802.11 Network Security Policy Basics 14 5.3.1 Describe the following General Security Policy elements: Risk Assessment, Impact Analysis, Security Auditing 5.3.2 Describe,the following Functional Security Policy elements: Baseline Practices; Design and Implementation Practices; Physical Security; Social Engineering; Monitoring, Response, and Reporting 802.11 RF Site Surveying 6.1 802.11 Network Site Survey Fundamentals 15 6.1.1 Explain the importance and processes involved in conducting a complete RF site survey 6.1.2 Explain the importance of and proprietary documentation involved in preparing for an RF site survey 6.1.3 Explain the technical aspects and information collection procedures involved in an RF site survey 6.1.4 Describe site survey reporting procedures 6.2 802.11 Network Site Survey systems and devices 16 6.2.1 Identify the equipment, applications, and system features involved in performing automated site surveys 6.2.2 Identify the equipment and applications involved in performing manual site surveys Exam objectives are subject to change at any time without prior notice and at Planet3’s sole discretion Please visit Planet3’s website (www.cwnp.com) for the most current listing of exam objectives .. .CWNA ® Certified Wireless Network Administrator? ?? Study Guide David D Coleman David A Westcott Wiley Publishing, Inc CWNA ® Certified Wireless Network Administrator? ?? Study Guide CWNA ® Certified... Chapter Wireless LAN Topologies Wireless Networking Topologies Wireless Wide Area Network (WWAN) Wireless Metropolitan Area Network (WMAN) Wireless Personal Area Network (WPAN) Wireless Local Area Network. .. infrared wireless networks The Wireless# exam (PW0-050) covers a moderate level of detail on a broad base of wireless technologies CWNA? ?, Certified Wireless Network Administrator The CWNA certification

Ngày đăng: 01/09/2013, 11:12

Từ khóa liên quan

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan