CCNAWirelessLabManual 2011S1
CCNAWirelessLabManual 2011S1
Lab Manual
Semester 2, 2010
Table of Contents
Configure Site-to-Site Wireless Link with BR1310................................................3
Configure Bridge Services ................................................................................11
Configure Layer 3 Site-to-Site Wireless Link Challenge Lab.............................. 15
BR1310 Configure Bridge Diversity Settings .................................................... 19
Configure VLANs on the AP ...............................................................................22
WLAN Design.....................................................................................................29
Configuring a WLAN Controller .........................................................................33
Wireless Mathematics........................................................................................43
Challenges of Wireless Regulations...................................................................45
Configuring a WLAN Controller via the Web Interface.......................................50
Configure Filters on AP ......................................................................................64
Configure Enterprise Security on AP .................................................................71
Configuring Site-to-Site Wireless Link using Enterprise Security ......................81
Configuring LEAP/EAP using Local RADIUS Authentication ............................... 87
Configuring WPA Security with Preshared Keys ................................................96
Configure Syslog on AP....................................................................................112
Configuring Syslog on a WLAN Controller........................................................116
Configuring Syslog via CLI...............................................................................118
Configuring Syslog via GUI..............................................................................121
Configure SNMP on AP.....................................................................................124
CCNA Wireless Lab Manual Page 3
Objective
Configure a site-to-site bridged network.
Scenario
A remote location several miles away requires connectivity to the existing wired
network. The two LAN segments will use a wireless bridge for their physical layer
connection using two Cisco Aironet Bridges (BR1310s).
Note This lab uses a different subnet mask to identify the two segments of the same
network. These two segments, although separated by distance, remain part of the same
LAN through the use of a Wireless physical layer link.
Topology
B Connect the Power Injector to the BR1310 using the RG-59 coax cables
a. Connect a nine-pin, female DB-9 to RJ-45 serial cable to the RJ-45 serial port on the
power injector and to the COM port on your PC.
b. Open a terminal emulator.
c. Enter these settings for the connection:
• Bits per second (baud rate): 9600
• Data bits: 8
• Parity: none
• Stop bits: 1
• Flow control: None
d. When the terminal emulator is activated, press Enter . An Enter Network
Password window appears. The default username is Cisco . The default password is
Cisco . Both the username and password are case sensitive.
e. Upon a success login, the bridge will display the user mode prompt.
f. Enter the enabled mode by typing the enable command and providing the default
password: Cisco .
br>enable
Password:*****
br#
g. Reset the bridge to factory defaults by entering the erase nvram command and
confirming.
br#erase nvram
Erasing the nvram filesystem will remove all configuration files!
Continue? [confirm]
c. Open a web browser, type the default bridge address http://10.0.0.1 , and press
Enter.
d. When prompted for the username and password, enter the case-sensitive default
values:
i. Username: Cisco
ii. Password: Cisco
e. The bridge Home page will open displaying the Summary Status of the bridge.
f. Navigate to the Express setup page by selecting the Express Setup link from the
left navigation bar. The Express Setup page will allow configuration of some basis
settings.
From the left navigation bar, select the Security>SSID Manager link to configure SSIDs
on the bridges.
a. From the Current SSID List, make sure that <NEW> is selected. Configure a new
SSID for both bridges to the value: BR1 .
b. Leave all other fields at their default values.
c. Click Apply to save the settings.
d. After the page refreshes, there will be 2 SSIDs in the current list.
e. Scroll to the bottom and select the BR1 SSID for the Infrastructure SSID,
and click the check box to force infrastructure devices to associate using this SSID.
a. Record the MAC address of the root bridge radio. This address can be found on the
Summary Status page of the root bridge.
non-root bridge
To ensure that the non-root bridge associates with the correct root bridge, the root
parent MAC address can be configured on the non-root bridge.
a. Record the MAC address of the root bridge radio. This address can be found on the
Summary Status page of the root bridge.
b. From the non-root bridge, navigate to the Settings tab of the Radio interface.
c. Scroll to the bottom of the settings page to enter the root bridge radio MAC address
in the Root Parent MAC address field. Click Apply to save the configuration.
The non-root bridge should now be associated with the root bridge. To view the current
associations on each bridge, open a web connection to the bridge from the wired PC.
b. Select the Association link from the left navigation bar. All associated devices
should appear in the list.
1. Which devices are listed in the Association table for BR1? What device is the parent
for this association?
____________________________________________________________
2. Which devices are listed in the Association table for BR2? What device is the parent
for this association?
____________________________________________________________
a. Once the wireless bridge link is configured properly, ping from PC1 to BR2. Then
ping from PC1 to PC2. Were these successful?
____________________________________________________________
b. Test layer 7 connectivity by browsing to BR2 from PC1. Was this successful?
____________________________________________________________
Objective
In this lab, students will configure various services on the BR1310.
Scenario
The bridge Services configuration page is used to set parameters for various services,
including:
Telnet/SSH, CDP, DNS, Filters, HTTP, Proxy Mobile IP, QoS, SNMP, NTP, VLAN, STP,
and ARP Caching.
Topology
Preparation
The students will read and familiarize themselves with the concepts and procedures of
Chapter 6 Prior to the lab
a. Terminal Type:
____________________________________________________________
b. Columns:
____________________________________________________________
c. Lines:
____________________________________________________________
If remote access to the bridge is a concern, the Telnet feature of the bridge unit may be
disabled by checking the Disabled button on this page.
Step 3 Configuring the time server parameters of the bridge unit to set the time
From the Setup page in the Services section, select the NTP option.
In order to configure time parameters of the bridge, complete the following steps:
a. Select the GMT Offset for your time zone from the drop down list.
c. Manually set the date and time following the format provided in parenthesis.
e. The time settings can be confirmed by causing a log entry to be entered. From the
Express Set-up page, change the bridge System Name and apply the new settings.
f. Navigate to the Home page after the new name is saved. The Event Log should have
an entry with the correct GMT date and time.
Objective
Configure a site-to-site bridge network separated by a Layer 3 device. Test the speed of
the wireless bridge link.
Scenario
A remote location which is several miles away requires connectivity to the existing wired
network. The connection can be bridged wirelessly with two BR350s. In large networks, it
is necessary to provide Layer 2 broadcast control using routers.
Preparation
The instructor or students must cable and configure the perimeter routers in addition to the
wired LAN. The routers Ethernet interfaces must be configured and enabled. Static routing
should be configured on the routers. Ensure that the devices are configured according to
the topology. The bridge devices should be configured as follows:
Using dual Ethernet routers, such as an 806, 2514, or equivalent. Configure both routers
with the following commands:
no shut no shut
! !
router eigrp 1 router eigrp 1
b. Enter the MAC address of the Root Bridge radio into the Root Parent MAC 1: field.
Remember to use the MAC address of the root bridge radio.
c. Click the Apply button to apply the settings.
a. Once the wireless bridge link is configured properly, conduct each of the following tests:
Objective
The student will test the effects of various antenna diversity settings on the Cisco BR1310
Scenario
Bridges have two RP-TNC connectors attached them. These two antennas connectors are
for diversity in signal reception, and their purpose is not to increase coverage or distance.
They help eliminate the null path and RF being received out of phase. Only one antenna at
a time is active. Which antenna is active is selected on a per-client basis for optimal signal
and only applies to that specific client. The bridge can hop back and forth between
antennas when talking to different clients.
Topology
Preparation
• Cisco BR1310
• Laptop or PC with a client adapter properly installed
a. Open a web browser and type the IP address of the bridge in the browser address box.
When prompted for the username and password enter the defaults or the username and
password provided by your instructor.
Note: if multiple bridge units are operating within the classroom it is important that they use
different channels.
c. Scroll down to the Receive and Transmit Antenna section. Both the Receive and
Transmit Antennas should be set to Diversity by default.
d. Before making any changes to the antenna settings, open the Aironet Desktop Utility on
the PC. From the Current Status tab, click the Advanced button and note the Signal
Quality and Signal Strength before any changes are made. The quality and strength will be
updated continuously if the Advanced Status window is left open.
e. Change the Receive and Transmit antenna settings to left, right, diversity or various
combinations and note any changes in the Signal Strength or Signal Quality once you have
applied the changes.
If using only one antenna, the Receive and Transmit antenna settings will have to
correspond to the proper bridge antenna setting for RF reception.
If using two standard dipole antennas, very little changes will be effected on the Site Survey
Meter. If you remove one of the antennas, you will observe a more dramatic effect in the
setting changes. Make numerous changes with the antenna settings and check the results
with the PC
Aironet Client Site Survey utility. Remember to only make one change at a time so that you
have a good idea which setting change caused the effect.
1. Which antenna setting gave the strongest signal quality (Left, Right, or Diversity)?
______________________________________________________________
2. Which antenna setting gave the strongest signal strength (Left, Right, or Diversity)?
______________________________________________________________
3. Which setting gave the weakest signal strength (Left, Right, or Diversity)?
______________________________________________________________
4. Which setting gave the weakest signal quality (Left, Right, or Diversity)?
______________________________________________________________
Objective
The student will extend VLANs into a WLAN.
Scenario
VLANs can be extended into a WLAN by adding IEEE 802.11Q tag awareness to the
AP. Frames destined for different VLANs are transmitted by the AP wirelessly on
different SSIDs with different WEP keys. Only the clients associated with that VLAN
receive those packets. Conversely, packets coming from a client associated with a
certain VLAN are 802.11Q tagged before they are forwarded onto the wired network.
2. Assign SSIDs to VLANs and enable the VLAN on the radio and Ethernet ports.
Topology
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_installation_and_configuratio
n_gu
ide_book09186a0080147d69.html
From the EXPRESS SET-UP page, configure the System Name and BVI address.
From the SECURITY>SSID Manager page, configure the 802.11b radio management, voice,
data,
and guest SSIDs, and authentication type according to the Preparation table.
a. Enter the management SSID in the SSID: box.
b. Select the authentication method.
c. Click Apply.
d. Repeat the steps for the voice, data, and guest SSIDs.
1. Why is VLAN ID 10 used for the management VLAN instead of VLAN ID 1?
From the SERVICES>VLAN page, configure the 802.11b radio for management, voice, data,
and guest VLANs according to the Preparation table.
a. Enter VLAN ID 10 in the VLAN ID: box. Since this is the management VLAN, check the Native
VLAN box. Also, check the Radio0-802.11B.
b. Choose the management SSID from the SSID drop down box.
c. Click Apply.
d. Repeat the steps for the voice, data, and guest VLANs.
a. Now create the SSIDs for the 802.11a radio and apply to the existing VLANs .
b. Verify the settings afterwards through the SECURITY home page.
c. Verify the setting through IOS CLI.
d. Return to Step 6 and configure 2 802.11a clients. Verify the connections.
e. Save the configuration to a text file.
Step 9 Trunk AP to AP
In this optional step, create a trunk between Pod APs through one of the following methods:
• On a 802.1q enabled switch, connect each APs to a switch with 802.1q trunking enabled on
WLAN Design
Estimated Time: The time needed for this lab may vary
Number of Team Members: Students will work individually or in small groups.
Objective
In this lab, students will identify various applications of wireless local area networks (WLANs).
The student will then choose one application and detail a WLAN design for it. The detailed
design should utilize all of the following to present their findings:
• Drawings
• Configurations
• Topologies
• Issues
• Advantages
• Disadvantages
• Challenges
• Any other useful information
Scenario
The four main design requirements for a WLAN solution are as follows:
• It must have high availability
• It must be scalable
• It must be manageable
• It must be an open architecture allowing integration with third-party equipment
Along with the design requirements there are a few WLAN design basics:
• Same principles apply to all WLAN designs
• Get to know the customer and the customer’s needs
• Design the WLAN to meet those needs
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
Step 7 Interference
The following steps must be taken when dealing with potential interference to the WLAN:
Identify the typical sources of RF interference for the type of industry that the WLAN
application is being designed for.Locate each type of RF interference and note a possible option
or solution for this type of Interference. Note the sources of RF interference on the diagram.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
Step 8 Encryption
Encryption must also be considered depending on the client and the industry the WLAN is
being designed for:
What are the data security and privacy requirements of the customer?
What methods will be used to ensure their privacy and security requirements for the wireless
LAN?
No encryption
40 bit encryption
128 bit encryption
Note the advantages and disadvantages of each.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
Scenario
In the next two labs, you will configure a wireless solution involving a WLAN controller, two
lightweight wireless access points, and a switched wired network. You will configure a
WLAN controller to broadcast SSIDs from the lightweight wireless access points. If you
have a wireless client nearby, connect to the WLANs and access devices from the inside
of your pod to verify your configuration of the controller and access points.
Note: It is required that you upgrade the WLC firmware image to 4.0.206.0 or
higher in order to accomplish this lab.
Step 1
Erase the startup-config file and delete the vlan.dat file from each switch. On the
WLAN controller, use the clear controller command followed by the reset system
command to reset them.
Step 2
Explanation of VLANs:
VLAN 1 – This VLAN is the management VLAN for the WLC
VLAN 2 and VLAN 3 – These VLANs are for hosts in the WLANs
VLAN 10 – The host is in this VLAN
Set up DLS1 as a VTP server, and ALS1 and ALS2 as clients. Put them in VTP
domain CISCO. Set up the switch-to-switch links shown in the diagram as 802.1q
trunks. Add VLANs 2, 3, 10, 50, and 100 to DLS1.
DLS1(config)# vtp mode server
DLS1(config)# vtp domain CISCO
DLS1(config)# vlan 2,3,10,50,100
DLS1(config-vlan)# interface fastethernet0/8
DLS1(config-if)# switchport trunk encapsulation dot1q
DLS1(config-if)# switchport mode trunk
DLS1(config-if)# interface fastethernet0/10
DLS1(config-if)# switchport trunk encapsulation dot1q
DLS1(config-if)# switchport mode trunk
ALS1(config)# vtp mode client
ALS1(config)# vtp domain CISCO
ALS1(config)# interface fastethernet0/8
ALS1(config-if)# switchport mode trunk
ALS2(config)# vtp mode client
ALS2(config)# vtp domain CISCO
ALS2(config)# interface fastethernet0/10
ALS2(config-if)# switchport mode trunk
Verify that VTP traffic has passed between the switch by comparing the non-zero VTP
configuration revision between switches with the show vtp status command.
DLS1# show vtp status
VTP Version : 2
Configuration Revision : 1
Maximum VLANs supported locally : 1005
Number of existing VLANs : 10
VTP Operating Mode : Server
VTP Domain Name : CISCO
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x6A 0x6B 0xCA 0x3C 0xF0 0x45 0x87 0xAC
Configuration last modified by 0.0.0.0 at 3-1-93 00:02:01
Local updater ID is 0.0.0.0 (no valid interface found)
ALS1# show vtp status
VTP Version : 2
Configuration Revision : 1
Maximum VLANs supported locally : 255
Number of existing VLANs : 10
VTP Operating Mode : Client
VTP Domain Name : CISCO
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x6A 0x6B 0xCA 0x3C 0xF0 0x45 0x87 0xAC
Configuration last modified by 0.0.0.0 at 3-1-93 00:02:01
ALS2# show vtp status
VTP Version : 2
Configuration Revision : 1
Maximum VLANs supported locally : 255
Number of existing VLANs : 10
VTP Operating Mode : Client
VTP Domain Name : CISCO
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x6A 0x6B 0xCA 0x3C 0xF0 0x45 0x87 0xAC
Configuration last modified by 0.0.0.0 at 3-1-93 00:02:01
Step 3
Configure all the switched virtual interfaces (SVIs) shown in the diagram for DLS1.
DLS1(config)# interface vlan 1
DLS1(config-if)# ip address 172.16.1.1 255.255.255.0
DLS1(config-if)# interface vlan 2
DLS1(config-if)# ip address 172.16.2.1 255.255.255.0
DLS1(config-if)# interface vlan 3
DLS1(config-if)# ip address 172.16.3.1 255.255.255.0
DLS1(config-if)# interface vlan 10
DLS1(config-if)# ip address 172.16.10.1 255.255.255.0
DLS1(config-if)# interface vlan 50
DLS1(config-if)# ip address 172.16.50.1 255.255.255.0
DLS1(config-if)# interface vlan 100
DLS1(config-if)# ip address 172.16.100.1 255.255.255.0
Step 4
DHCP gives out dynamic IP addresses on a subnet to network devices or hosts rather
than statically setting the addresses. This is useful when dealing with lightweight
access points, which usually do not have an initial configuration. The WLAN controller
that the lightweight wireless access point associates with defines the configuration. A
lightweight access point can dynamically receive an IP address and then
communicate over IP with the WLAN controller. In this scenario, you will also use it to
assign IP addresses to hosts that connect to the WLANs.
First, set up DLS1 to exclude the first 150 addresses from each subnet from DHCP to
avoid conflicts with static IP addresses by using the global configuration command ip
dhcp excluded-address low-address [high-address].
DLS1(config)# ip dhcp excluded-address 172.16.1.1 172.16.1.150
DLS1(config)# ip dhcp excluded-address 172.16.2.1 172.16.2.150
DLS1(config)# ip dhcp excluded-address 172.16.3.1 172.16.3.150
DLS1(config)# ip dhcp excluded-address 172.16.10.1 172.16.10.150
DLS1(config)# ip dhcp excluded-address 172.16.50.1 172.16.50.150
DLS1(config)# ip dhcp excluded-address 172.16.100.1 172.16.100.150
To advertise on different subnets, create DHCP pools with the ip dhcp pool name
command. After a pool is configured for a certain subnet, the IOS DHCP server processes
requests on that subnet, because it is enabled by default. From the DHCP pool prompt,
set the network and mask to use with the network address /mask command. Set a default
gateway with the default-router address command.
VLAN 50 also uses the option command, which allows you to specify a DHCP
option. In this case, option 43 is specified (a vendor-specific option), which gives
the lightweight wireless access points the IP address of the WLAN controller AP
Manager interface. It is specified in a hexadecimal TLV (type, length, value) format.
F1 is the hardcoded type of option, 04 represents the length of the value (an IP
address is 4 octets), and AC106464 is the hexadecimal representation of
172.16.100.100, which is going to be the AP manager address of the WLAN
controller. DHCP option 60 specifies the identifier that access points will use in
DHCP. This lab was written using Cisco Aironet 1240 series access points. If you are
Step 5
On all three switches, configure each access point’s switchport with the spanning-
tree portfast command so that each access point receives an IP address from DHCP
immediately, thereby avoiding spanning-tree delays. Use VLAN 100 as the AP
Manager interface for the WLAN controller. All control and data traffic between the
controller and the lightweight wireless access points passes over this VLAN to this
interface. Configure the ports going to the lightweight wireless access points in VLAN
50. DLS1 will route the traffic between the VLANs. Configure the interface on DLS1
that connects to the WLAN controller as an 802.1q trunk.
DLS1(config)# interface fastethernet0/5
DLS1(config-if)# switchport trunk encapsulation dot1q
DLS1(config-if)# switchport mode trunk
ALS1(config)# interface fastethernet0/5
ALS1(config-if)# switchport mode access
ALS1(config-if)# switchport access vlan 50
ALS1(config-if)# spanning-tree portfast
ALS2(config)# interface fastethernet0/5
ALS2(config-if)# switchport mode access
ALS2(config-if)# switchport access vlan 50
ALS2(config-if)# spanning-tree portfast
Step 6
You have a PC running Microsoft Windows attached to DLS1. First, configure the
switchport facing the host to be in VLAN 10.
DLS1(config)# interface fastethernet0/6
DLS1(config-if)# switchport mode access
DLS1(config-if)# switchport access vlan 10
DLS1(config-if)# spanning-tree portfast
Next, configure the host with an IP address in VLAN 10, which will later be used to
access the HTTP web interface of the WLAN controller.
Right-click on the LAN interface that connects to DLS1, and select Properties.
Select Internet Protocol (TCP/IP) and then click the Properties button.
Click OK to apply the TCP/IP settings, and then again to exit the configuration dialog box.
From the Start Menu, click Run. Issue the cmd command and press the Return key. At the
Windows command-line prompt, ping DLS1’s VLAN 10 interface. You should receive
responses. If you do not, troubleshoot, verifying the VLAN of the switchport and the IP
address and subnet mask on each of the devices on VLAN 10.
C:\Documents and Settings\Administrator> ping 172.16.10.1
Pinging 172.16.10.1 with 32 bytes of data:
Reply from 172.16.10.1: bytes=32 time=1ms TTL=255
Reply from 172.16.10.1: bytes=32 time<1ms TTL=255
Reply from 172.16.10.1: bytes=32 time<1ms TTL=255
Reply from 172.16.10.1: bytes=32 time<1ms TTL=255
Ping statistics for 172.16.10.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 1ms, Average = 0ms
Step 7
Enable IP routing on DLS1. This lets DLS1 route between all subnets shown in the
diagram. DLS1 can effectively route between all the VLANs configured because it has
an SVI in each subnet. Each IP subnet is shown in the output of the show ip route
command issued on DLS1.
DLS1(config)# ip routing
DLS1# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
172.16.0.0/24 is subnetted, 7 subnets
C 172.16.1.0 is directly connected, Vlan1
C 172.16.2.0 is directly connected, Vlan2
C 172.16.3.0 is directly connected, Vlan3
C 172.16.10.0 is directly connected, Vlan10
C 172.16.50.0 is directly connected, Vlan50
C 172.16.100.0 is directly connected, Vlan100
Step 8
When you first restart the WLAN controller, a configuration wizard prompts you to enter
basic configuration attributes. You will know that you have entered the wizard interface
when you see “Welcome to the Cisco Wizard Configuration Tool.” Pressing the Return key
allows the default configuration options to be used. The default option will be in square
brackets in the wizard prompts. If there is more than once choice in square brackets, it will
be the option in capital letters.
The first prompt asks for a hostname. Use the default. Use “cisco” as both the username
and password.
Welcome to the Cisco Wizard Configuration Tool
Use the '-' character to backup
System Name [Cisco_49:43:c0]:
Enter Administrative User Name (24 characters max): cisco
Enter Administrative Password (24 characters max): <cisco>
Configure an interface to communicate with the lightweight access points. This will be in
VLAN 100 and is tagged as such on the trunk.
AP Manager Interface IP Address: 172.16.100.100
AP Manager Interface Netmask: 255.255.255.0
AP Manager Interface Default Router: 172.16.100.1
AP Manager Interface VLAN Identifier (0 = untagged): 100
AP Manager Interface Port Num [1 to 4]: 1
AP Manager Interface DHCP Server (172.16.1.1): 172.16.100.1
Configure the virtual gateway IP address as 1.1.1.1 (this is acceptable because you are
not using this for routing). The virtual gateway IP address is typically a fictitious,
unassigned IP address, such as the address we are using here, to be used by Layer 3
Security and Mobility managers.
Virtual Gateway IP Address: 1.1.1.1
Configure the mobility group and network name as “ccnppod.” Allow static IP addresses by
hitting enter, but do not configure a RADIUS server now.
Mobility/RF Group Name: ccnppod
Network Name (SSID): ccnppod
Allow Static IP Addresses [YES][no]:
Configure a RADIUS Server now? [YES][no]: no
Warning! The default WLAN security policy requires a RADIUS server.
Please see documentation for more details.
Use the defaults for the rest of the settings. (Hit enter on each prompt).
Enter Country Code (enter 'help' for a list of countries) [US]:
Enable 802.11b Network [YES][no]:
Enable 802.11a Network [YES][no]:
Enable 802.11g Network [YES][no]:
Enable Auto-RF [YES][no]:
Configuration saved!
Resetting system with new configuration...
NOTE: Wireless equipment varies from country to country. Please use the appropriate country
code.
Step 9
When the WLAN controller has finished restarting, log in with the username “cisco”
and password “cisco.”
User: cisco
Password: <cisco>
Change the controller prompt to WLAN_CONTROLLER with the config prompt name
Enable Telnet and HTTP access to the WLAN controller. HTTPS access is enabled by
default, but unsecured HTTP is not.
(WLAN_CONTROLLER) > config network telnet enable
(WLAN_CONTROLLER) > config network webmode enable
Save your configuration with the save config command, which is analogous to the Cisco
IOS copy run start command.
(WLAN_CONTROLLER) > save config
Are you sure you want to save? (y/n) y
Configuration Saved!
To verify the configuration, you can issue the show interface summary, show wlan
summary, and show run-config commands on the WLAN controller.
How is the WLAN controller’s show run-config command different than the Cisco IOS show
running-config command?
Final Configurations
DLS1# show run
hostname DLS1
!
ip routing
ip dhcp excluded-address 172.16.1.1 172.16.1.150
ip dhcp excluded-address 172.16.2.1 172.16.2.150
ip dhcp excluded-address 172.16.3.1 172.16.3.150
ip dhcp excluded-address 172.16.10.1 172.16.10.150
ip dhcp excluded-address 172.16.50.1 172.16.50.150
ip dhcp excluded-address 172.16.100.1 172.16.100.150
!
ip dhcp pool pool2
network 172.16.2.0 255.255.255.0
default-router 172.16.2.1
!
ip dhcp pool pool3
network 172.16.3.0 255.255.255.0
default-router 172.16.3.1
Wireless Mathematics
Estimated Time: 25 minutes
Number of Team Members: Students will work in teams of two or individually
Objective
In this lab, the student will learn the importance of the output power of the transmitting wireless device.
Students will calculate the amount of power actually transmitted from a wireless transmitting device. This will
be done through the antenna element, the Effective Isotropic Radiated Power (EIRP) based on the type of
antenna, cabling, connectors, and the transmitting device setting being used.
Scenario
Upon completion of this lab, students will calculate potential range of the radiated wave signal
transmitted by wireless devices. Students will also convert all radio frequency (RF) signal ratings into a
common decibel (dB) unit in order to calculate power gain or loss.
Preparation:
Prior to the lab, students should review the course materials up to 2.4
Additional Materials
http://www.zytrax.com/tech/wireless/calc.htm
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a00800e90fe.shtml#topic1
http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_installation_guide_chaper09186a008018
4b5a.html
http://www.cisco.com/en/US/products/hw/wireless/ps469/products_data_sheet09186a008008883b.html
Students should research the Cisco website for the following information if needed:
• Technical specifications of the power output in decibels (milliwatts) of the wireless devices
used. AP and client adapters are examples of these devices.
• Technical specifications of the gain/loss in decibels (dB) of various wireless device cables
Band 2.4 5.15 – 5.25 5.25 – 5.35 5.470 – 5.725 5.725 – 5.825
(GHz)
EIRP 100 mW 200 mW 200 mW 1000 mW 25 mW
20 dBm 22 dBm 22 dBm 30 dBm 14 dBm
Since decibels are ratios comparing two power levels, simple math can be used to manipulate them for
designing and building networks.
Using the previous example:
Power (in dBm) = 10 * log10 (5 * 10) = (10 * log10 (5)) + (10 * log10 (10)) = 7 + 10 = 17 dBm
Objective
The student will learn the future direction and technologies associated to wireless regulations.
Scenario
There is continual development in wireless LAN (WLAN) technologies. One primary challenge is to conform
to local, state, and national regulations related to wireless LAN emissions. Our focus is on Wireless
emissions that occur in the 2.4 GHz and 5 GHz radio frequency spectrums. In this lab, each team will be
assigned a topic to investigate.
Preparation
The instructor should compile a list of wireless regulatory bodies.
This lab will require a computer with a connection to the Internet for online research purposes.
The student teams should be encouraged to research resources such as trade publications,
magazines, and vendor literature that are applicable to current and future trends in the area of
wireless local area networks.
5 mW 6 dBi 20
50 mW 9 dBi 397
1. What is the maximum allowable output power in dBm and Watts for the 2.4 GHz band?
FCC
________________________________________________________________________
ETSI
________________________________________________________________________
(Other Regulatory domain)
________________________________________________________________________
2. What is the maximum allowable output power in dBm and Watts for the 5GHz band?
FCC
________________________________________________________________________
ETSI
________________________________________________________________________
(Other Regulatory domain)
________________________________________________________________________
________________________________________________________________________
4. What power levels can be set for the 2.4 GHz radio on an AP 1100? 350? 1200?
________________________________________________________________________
5. What power levels can be set for the 2.4 GHz radio on an PCM 350 NICs?
________________________________________________________________________
6. What power levels can be set for the 5 GHz radio on an AP 1200?
________________________________________________________________________
7. What are the approximate dBm values for each of the following power levels?
dBm mw
___dBm 1mW
___dBm 5mW
___dBm 20mW
___dBm 30mW
___dBm 50mW
___dBm 100mW
The dB notation can also be used to describe the power level rating of antennas: dBi for use with isotropic
antennas (theoretical antennas that send the same power density in all directions) and dBd when referring to
dipole antennas. Antennas are compared to this ideal measurement, and all FCC calculations use this
measurement (dBi.) Dipole antennas are more real world antennas. While some antennas are rated in dBd,
the majority use dBi. The power rating difference between dBd and dBi is approximately 2.2; that is, 0dBd =
2.2dBi. Therefore, an antenna rated at 3dBd is rated by the FCC
(and Cisco) as 5.2dBi.
Example 1:
Description Cisco Part Number Power
AP AIR-AP1200-A-K9 20 dBm
Antenna gain: AIR-ANT2012 6 dBi
Antenna Cable loss: AIR-CAB050LL-R -3.35 dBi
________________________________________________________________________
b. What are the primary hardware factors involved that affect signal distance?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Topology Diagram
Scenario
Continuing from the previous lab, you will now set up the WLAN controller through its
web interface. Previously you configured it through the CLI.
Step 1
Set up all the switches as they were in the previous lab. Make sure that the WLAN
controller and host also have the same configuration as before.
Step 2
On the host, open up Internet Explorer and go to the URL “https://172.16.1.100”. This
is the secure method of connecting to the management interface of the WLAN
controller. You can also use
Use “cisco” as both the username and password. You configured these in the previous
lab. Click OK to get to the main page of the graphical user interface (GUI). You are
then presented with the monitor page for the WLAN controller.
Make sure you see 2 access points under the “Access Point Summary” part of the
page. You may also see it detecting rogue access points if your lab has other wireless
networks around it; this behavior is normal. You can also see various port controller
and port statistics by clicking their respective links on the left-hand menu on the
screen.
Step 3
The next task in configuring WLANs is to add in the logical interfaces on the WLAN
controller corresponding to VLANs 2 and 3. To do this, click the Controller link on the
top of the web interface. Then, click Interfaces link on the left side bar.
Click the New... link to create a new interface. Give the new interface a name of VLAN2
and VLAN number 2. Click Apply to submit the parameters.
On the next page, configure the IP address shown in the diagram. Also configure this
on physical port 1, since that is the port trunked to the switch. After you have entered
in all the changes, click Apply. Click OK to the warning box that comes up. This
warning says that there may be a temporary connectivity loss on the APs while
changes are applied.
The new interface should appear in the interfaces list. Do the same configuration
steps for VLAN 3.
Step 4
Now, you can configure the WLANs corresponding to these VLANs. To do this, first
click the WLANs link at the top of the page. This will show you all configured WLANs.
On the existing one, click Edit on the right of it. Remove the layer 2 security and
change the interface to VLAN2. This will associate this WLAN with the correct VLAN.
Click Apply and click OK to the warning box that comes up.
Click New... and configure a WLAN for VLAN 3. Use the SSID “ccnplab”.
On this
WLAN, configure the layer 2 security as Static WEP and use a 40 bit WEP key. Make the
key index 2 and use a key of “cisco”. Also, set the administrative status of the WLAN to
enabled and change the interface name to VLAN3. When you are done, click Apply and
you should see both WLANs in the WLAN list.
At this point, if you have a computer with a wireless card installed you should be able to see
both SSIDs and connect to the WLANs/VLANs associated with them. Notice that each WLAN
exists in a separate subnet, because each WLAN is in a separate VLAN.
Configure Filters on AP
Objective
In this lab, the student will learn how to set and enable a protocol filter on the AP and how
to set and enable MAC address filters on the AP.
Scenario
Protocol filters prevent or allow the use of specific protocols through the AP. Individual
protocol filters or sets of filters can be set up for either the Radio or Ethernet ports.
Protocols can be filtered for wireless client devices, users on the wired LAN, or both.
MAC address filters allow or disallow the forwarding of unicast and multicast packets either
sent from or addressed to specific MAC addresses. A filter can be created that passes
traffic to all MAC addresses except those that are specified. A filter can also be created that
blocks traffic to all MAC addresses except those that are specified.
Topology
Preparation
The APs and PC client adapter and utility should be installed and properly configured prior
to the lab. The students will also familiarize themselves with the various EtherType, IP, and
port filters available on the AP.
d.Make sure <NEW> (the default) is selected in the Create/Edit Filter Index menu.
e. In the Filter Index field, name the filter with a number from 701.
f. Enter a MAC address wireless PC2 in the Add MAC Address field. Enter the address with
periods separating the three groups of four characters (0007.50CA.E208, for example).
h. Click Add . The MAC address appears in the Filters Classes field.
i. Click Apply . The filter is saved on the AP, but it is not enabled until it is applied on the
Apply Filters page
b. Select the filter number 701 from the Radio0-802.11B MAC drop-down menus. Apply the
filter to incoming and outgoing packets.
a. From the SERVICES>Filters Page change the 701 to <NONE> on both Incoming and
Outgoing.
b. Click Apply .
d. Make sure <NEW> (the default) is selected in the Create/Edit Filter Index menu, and
then click the Add button.
e. Enter a descriptive name of MYFILTER for the new filter in the Filter Name field.
f. Select Block all as the filter's default action from the Default Action menu.
h. Add 10.0.P.12 as the Source Address: with a Mask: of 0.0.0.0 to permit PC2 traffic.
j. Click the Add button. The ACL will now appear in the Filters Classes Box at the
bottom of the Filters page.
a. Select MYFILTER from the radio ports incoming and outgoing IP fields.
Objective
In this lab, students will demonstrate an understanding of the role of enterprise wireless
network security. Additionally, students will configure MIC, TKIP and BKR on an AP.
Scenario
The purpose of WEP is to protect the privacy of transmitted data. However, WEP has
inherent security weaknesses. There are many mechanisms available to provide
additional security for WEP.
Topology
Preparation
The AP and PCs should be properly setup according to the following topology Ensure
an existing wireless connection is present from PC2 to the AP.
The MIC, implemented on both the AP and all associated client devices, adds a few
bytes to each packet to make the packets tamper proof.
• TKIP (Temporal Key Integrity Protocol, also known as WEP key hashing) —
This feature defends against an attack on WEP in which the intruder uses the
unencrypted initialization vector (IV) in encrypted packets to calculate the WEP key.
TKIP removes the predictability that an intruder relies on to determine the WEP key by
exploiting IVs. On the AP, this feature is the Enable Per Packet Keying (PPK) option.
a. Check the Enable MIC and Enable Per Packet Keying (PPK). These
mechanisms can be used separately or together.
b. Click Apply-All
f. From the ACU Statistics Page, verify the “Packets MIC OK” statistics. The MIC
statistics should now appear between the “Packets Aged” and “Up-Time” values. These
values appear when MIC is enabled on the AP.
g. From the SECURITY Page, verify MIC and PPK are enabled.
h. What does MIC do to protect WEP?
____________________________________________________________
e. From the SECURITY Page, verify Key Rotation is enabled.Page, verify Key
Rotation is enabled.
Using Cisco Centralized Key Management (CCKM), authenticated client devices can
roam from one AP to another without any perceptible delay during reassociation. An AP
on the network provides
Wireless Domain Services (WDS) and creates a cache of security credentials for
CCKM-enabled client devices on the subnet. The WDS AP cache of credentials
dramatically reduces the time required for reassociation when a CCKM-enabled client
device roams to a new AP. When a client device roams, the WDS AP forwards the
client's security credentials to the new AP, and the reassociation process is reduced to a
two-packet exchange between the roaming client and the new AP. Roaming clients
Authenticated Key
Management Types Compatible Cipher Suites
Objective
Scenario
A remote location located several miles away requires connectivity to the existing wired
network. The connection can be bridged wirelessly with the use of two BR1310s. The
company’s security policy mandated a minimum of 128 bit WEP security for all wireless
connections.
Topology
Preparation
b. Open a web browser, enter the bridge BVI address http://10.0.P.1, and press
Enter .
a. Once the wireless bridge link is configured properly, ping from PC1 to BPod2. Then
ping from PC1 to PC2.
b. Select the radio button for Encryption Key 1 in the Transmit Key column. Make
sure that drop down list has 128-bit selected for Key Size.
c. Click in the Encryption Key field and enter a WEP key. For a 128-bit encryption, the
key will need to be 26 hexadecimal characters in length. Only the numbers 0-9 and the
letters A-F can be used.
a. Once the wireless bridge link is functional, ping from PC1 to PC2 to test end-to-end
connectivity
b. Repeat the FTP download process from PC1 to PC2. Observe the download
performance across the wireless link.
c. What was the download speed in Mbps? Did WEP have an impact on performance?
___________________________________________________________
b. Click the Apply button. The wireless link will be lost with the other bridge.
f. View the Security Summary via the web browser for an overview of the security
settings.
Objective
In this lab, the student will learn about the second generation of Wireless LAN security and
how to implement LEAP on a Wireless LAN for secure client authentication. The main steps
to this lab are:
Topology
Scenario
One way to secure wireless LANs and improve network security is to use authentication for
accessing the AP. Wireless clients can use Extensible Authentication Protocol (EAP) to
authenticate to a wireless LAN. 802.1x local RADIUS authentication is available on the 1100
and 1200 APs. This allows LEAP/EAP to be used without requiring a Cisco Secure ACS Server.
Furthermore, this feature provides a backup for ACS Servers in an Enterprise network.
Preparation
Prior to this lab, the Cisco Aironet AP should be configured to allow clients to associate. The IP
address, hostname and SSID should be configured on the AP. A PC should be installed with a
Cisco Aironet Client Card, and it should already be associated to the AP.Cable the equipment
according to the Topology.Update the Aironet Client Utility version 6.0 or later.
In order to enable Cisco LEAP on the AP, WEP Encryption or a Cipher must be enabled.
a. From the SECURITY>Encryption Manager Page of the AP, configure the Encryption Key b.
Click on the WEP Encryption radio button.
c. Select Mandatory.
d. Click Apply-All.
e. The Cipher option can be used for greater security. What options are available?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
Complete the following steps to configure the Backup RADIUS Server from the
SECURITY>Server Manager Page:
a. Enter the IP address of the Local RADIUS server in the Server Name/IP entry field. This will be
the IP address of the AP where the local RADIUS database is running. Should be 10.0.P.1
b. Enter the Shared Secret key of secretkey
c. Click Apply.
Complete the following steps to configure a Local RADIUS Server from the
SECURITY>LocalRADIUS Server Page:
a. Click on the GENERAL SET-UP tab.
b. Enter the IP address of the Local RADIUS server in the Server Name/IP entry field. This will be
the IP address of the AP where the local RADIUS database is running, 10.0.P.1
c. Enter the Shared Secret key of secretkey
Complete the following steps to configure users from the SECURITY > Local
RADIUS Server Page:
a. Continue from the GENERAL SET-UP tab.
b. Enter the following users:
1 aaauser aaapass
2 Cisco1 ciscopass
c. Click Apply.
In order to enable Cisco LEAP on the AP, complete the following steps to configure the
Authentication Method:
From the SECURITY Home page of the AP, verify Network EAP is checked and the
only SSID is AP P . The default tsunami SSID should be deleted for security. Also verify
the Server Based Security is configured correctly as shown.
In order to enable the EAP in the Aironet client utility, complete the following steps:
a. On PC2, configure the TCP/IP settings for the Wireless Network Connection if
a DHCP server is not available. Otherwise, when the client authenticates, the wireless
PC will not be able to communicate through IP.
i. IP address of 10.0.P.12
ii. Subnet mask of 255.255.255.0
iii. Gateway of 10.0.P.254
b. Go to the Network Security tab in the Aironet Client Utility on PC2 and each of the
wireless client computers.
c. Select the LEAP from the Network Security Type: drop down list and click
Configure.
e. In the profile manager, select the profile which LEAP is configured on and click OK. If
a save username and password was not configured, an authentication screen should
come up asking for a user ID and password. Type in the following.
f. The ACM icon should change to green once the authentication is complete.
g. From PC1, PC2 or the ACS Server, browse to the AP ASSOCIATION page to verify
the connection.
From the ASSOCIATION page of the AP, verify the association state. This should
display all of the connected clients.
From the EVENT LOG Page of the AP, check the association logs.
From the SECURITY>Local RADIUS Server Page of the AP, click on the
STATISTICS tab. Verify the User Information for authentication successes, failures, and
blocks.
Objective
• Configure a Wireless LAN with WPA security policies using preshared keys
• Authenticate with a wireless access point with WPA security protocols
Topology
Select the appropriate diagram based upon whether you have external or internal
WLAN controllers:
In this lab, you will configure and verify Wi-Fi Protected Access ( WPA) security in a
wireless environment using preshared keys.
This lab requires two separate PCs, Host A and Host B. Host A will act on VLAN 10 as
the Cisco access control server (ACS) server and will also be used to configure the
wireless LAN (WLAN) controller as a PC has been used to do in previous labs. Host B
requires a Cisco wireless network card with the Aironet Desktop Utility installed. Host
B will function as a wireless client on WLAN 1 which corresponds to VLAN 2. You may
complete this scenario using either the external WLAN controller (WLC) or the
network module that resides in a router. However, you must load the final
configurations from the end of Lab 6.1: Configuring a WLAN Controller.
Note:
This lab will only go into the details of configuring WLAN security using WPA-PSK.
For more information on using the web interface of the WLC, consult Lab 6.2:
Configuring a WLAN Controller via the Web Interface.
Preparation
Complete Lab 6.1 and ensure that all switches and routers, the WLAN controller, and the
host are configured the way they would be at the end of Lab 6.1.
At the end of Lab 6.1, you should already have the following features configured and
verified:
• VLAN connectivity
• Trunk ports
Use “cisco” as both the username and password. You configured these in the previous
lab. Click OK to get to the main page of the graphical user interface (GUI). You are
then presented with the monitor page for the WLAN controller.
Make sure you see two access points under the “Access Point Summary” part of the
page. If you do not, reload the LWAPs, otherwise, troubleshoot. You may also see it
detecting rogue access points if your lab has other wireless networks around it; this
behavior is normal. You can also see various port controller and port statistics by
clicking their respective links on the left-hand menu on the screen.
Since this step is identical to steps found in Lab 6.2: Configuring a WLAN Controller
via the Web Interface, we will not explain the many details of each of the configuration
changes. For more information on what these changes do, reference Lab 6.2.
Click the Controller tab at the top of the window. Then, click Interfaces in the left
pane. Click New to create a new interface.
Name the interface “VLAN2” and assign it to 802.1Q tag 2, just like in Lab 6.2. Click Apply
when you have completed this.
Configure the IP address, default gateway, port number, and Dynamic Host Configuration
Protocol (DHCP) server for this interface as shown in Figure 2-3, and then click Apply.
Click the WLANs tab at the top of the screen to view the current WLAN configuration.
Click Edit for the WLAN shown (it is towards the right of the screen).
On the right side of the WLAN configuration page, chan ge the layer 2 security
method to WPA1+WPA2. Also make sure that the Broadcast SSID option is checked.
Even though you are broadcasting the service set identifier (SSID), no clients should
be able to connect until you set the security policies configured later.
Scroll down the page and change the interface to the VLAN 2 interface created earlier.
Use a WPA2 policy with Advanced Encryption Standar d (AES) encryption. Configure
a preshared key of “password”. Click Apply at the top of the page when done.
You should be returned to the WLAN list screen with the new security method shown.
Assuming that the LWAPs are associated with the WLC correctly, they should now
broadcast this SSID and clients should be able to connect.
What is the benefit in configuring preshared keys as the wireless security method?
What is the downside of configuring preshared keys as the wireless security method?
On Host B, open up the Cisco Aironet Desktop Utility either by the icon on the desktop or
the program shortcut in the start menu. If you do not have the Cisco Aironet Desktop Utility
(ADU) installed, consult Lab 6.3: Configuring a Wireless Client. Once in the ADU, click the
Profile Management tab. Next, click New to make a new profile.
Use a profile name and SSID of “ccnawireless” since this was the SSID configured in Lab
6.1. Use any client name desired. Here, “CiscoClient” is the name used.
Click the Security tab and set the sec urity type as WPA/WPA2 Passphrase. We are
using the passphrase because we configured preshared keys rather than a more
advanced method. After selecting the security method, click Configure.
Enter in the same password used before for WPA, which is “password,” and then click OK.
Click the Current Status tab and make sure that you have received an IP address in the
correct subnet. If you receive a correct IP, you have successfully configured and
connected to the WLAN.
Configure Syslog on AP
Estimated Time: 25 minutes
Number of Team Members: Students will work in teams of two.
Objective
In this lab, students will configure and use syslog logging to monitor network events.
Scenario
A network security administrator should always log significant events on the AP to the syslog
server.
A syslog server should be located on a secure internal network to ensure log integrity.
The syslog server can be a dedicated server or another server running syslog services.
A Syslog Server is a basic application that allows Aironet AP and bridge event information to be
viewed from a Windows system. It includes all the following features:
• Receiving syslog messages through either TCP or UDP
• Full reliability because messages can be sent through TCP
• Ability to receive syslog messages from devices
Topology
Preparation
The student will read and understand material presented in FWL Chapter 11 prior to this lab.
There are numerous syslog servers available on the Internet. This lab assumes that Kiwi Syslog
Daemon is used. This is a freeware utility that can be downloaded at
http://www.kiwisyslog.com.Download the syslog server and install the executable file.
Additional materials
Further information about the objectives covered in this lab can be found at the following
website: http://www.kiwisyslog.com
a. Click on the Kiwi Syslog Daemon Icon on the desktop to bring up the syslog screen.
a. Open up the AP browser menu and go to the EVENT LOG>Notification Options Page.
a. Generate events to the syslog by logging into the AP that is being monitored.
b. Have the wireless users log onto the AP.
c. Have the wireless users log off the AP.
d. These changes will trigger a logged event on the syslog. What is the message that was
displayed on the syslog?
___________________________________________________________________________
___________________________________________________________________________
Select the appropriate diagram based upon whether you have external or internal
WLAN controllers:
In all WLC versions prior to Version 5.0, only one syslog server can be configured. In order to
configure the syslog server with the CLI, enter this command from the WLC CLI:
Large deployments can want syslog messages sent to servers across different time−zones for
extended
visibility. Note: Syslog messages are sent on UDP Port 514; additional server configuration can
require a relaxation of firewall rules.
• With Wireless LAN Controller Release 5.0, a new CLI has been introduced to configure syslog
servers with the CLI. The old command has been deprecated.
In order to set the facility for outbound syslog messages to the remote host, use the
config logging syslog facility command.
In order to set the severity level to filter syslog messages to the remote host, use the
config logging syslog level command.
In order to remove a remote host that was configured to send syslog messages, enter this command:
#config logging syslog host host_IP_address delete
As mentioned earlier, a maximum of three servers can be configured. When multiple syslog servers
are configured, a copy of each syslog message is sent to all configured syslog servers.
In order to configure the WLC for syslog servers with the GUI, complete these steps from the
Wireless LAN Controller GUI.
Exercise 1
Setup syslog to log the following from the Wireless lan Controller.
Once you have configured each step. Clear it and move onto the next.
Be sure to verify that these things are being logged on the Host PC
a. Generate events to the syslog by logging into the AP that is being monitored.
b. Have the wireless users log onto the AP.
c. Have the wireless users log off the AP.
d. These changes will trigger a logged event on the syslog. What is the message that was
displayed on the syslog?
___________________________________________________________________________
___________________________________________________________________________
Exercise 2
Using resources available, discover what each security level is used for.
While doing this, take note and complete the following questions.
Configure SNMP on AP
Estimated Time: 20 minutes
Number of Team Members: Students will work in teams of two.
Objective
In this lab, the student will install and configure the Kiwi Syslog Daemon to listen for SNMP logs.
The student will configure the contact and location of the SNMP agent and test the
configuration.
Scenario
SNMP is an application-layer protocol that facilitates the exchange of management information
between network devices. It is part of the TCP/IP protocol suite. SNMP uses User Datagram
Protocol (UDP) port 161 for most requests and responses. SNMP traps use UDP port 162.
Topology
Preparation
Command list
In this lab exercise, the following commands will be used. Refer to this list if assistance or help
a. Click on the Setup icon located in the upper left corner of the syslog program window.
b. Configure SNMP on Kiwi Syslog Daemon by checking the Listen for SNMP Traps box.
c. Click the OK button to save the changes.
d. What UDP port does SNMP Trap Watcher listen on?
___________________________________________________________________________
a. Ensure the AP is configured according to the Topology and Preparation table. Ping from
PC1,located at 10.0.P.10 to the AP to ensure connectivity.
b. Browse to the SERVICES>SNMP Page of the AP.
c. Click the Enabled radio button to Enable SNMP on the AP.
d. Set a System Name (this is optional, but useful)
e. Set a System Location (this is optional, but useful)
f. Set a System Contact (this is optional, but useful)
g. Complete the following information for your AP in the table below:
System Name
System Location
System Contact
Create a public community string with Read Only. In a production environment, it is important
to configure a unique string for increase security. SNMP read only provides monitoring through
an SNMP management application.
SNMP read-write access monitoring and management using SNMP management applications.
a. Click on the <NEW> in the Current Community String
b. Create a private1234 community string with Read_Write
c. Click the Apply button to create the string.
a. Set a SNMP Trap Destination by entering the IP address of PC1 located at 10.0.P.10.
b. Set the SNMP Trap Community to public.
c. Enable All Trap Notifications.
d. Click the Apply button
a. Click on the Kiwi Syslog Daemon Icon on the desktop to bring up the syslog application.
The Kiwi Syslog Daemon can be customized or the defaults can be used.
b. Have a wireless user connect to the bridge.
c. Have the wireless user disconnect from the bridge.
Step 8 Set the system contact, and location of the SNMP agent
through IOS CLI
Before beginning this step, reset the AP back to factory configuration. Configure the AP
according to the Topology and Preparation table.
a. Now configure the system contact and location:
PodP(config)#snmp-server contact [name] [phone]
PodP(config)#snmp-server location [location]
b. What command would be used to verify this information on an AP?
___________________________________________________________________________
commands
PodP(config)#no snmp-server enable traps
PodP(config)#no snmp-server system-shutdown
PodP(config)#no snmp-server trap-auth
Note By disabling SNMP trap notifications, which are not needed, the amount of free bandwidth can be
increased and unnecessary SNMP processing tasks can be eliminated.