How did mac filtering affect your ability to connect to ap

Assignment Help Computer Networking
Reference no: EM131513880

Question: Configuring a Wireless Network for Security Time Required: 40 minutes Objective: Install a wireless NIC (if necessary), connect to an access point, and configure security options. Required Tools and Equipment: Two or more computers with 802.11 wireless NICs installed; USB wireless NICs work well because they don't require opening the computer case, and laptops with built-in wireless NICs will also do. One wireless AP or wireless router configured with the SSID NetEss. The 802.11 standard supported doesn't matter as long as the AP is compatible with the NICs. The computers shouldn't be connected to a hub or switch. Description: In this challenge lab, you connect to a wireless access point and then configure security and other options. You can work in groups or have the instructor configure the AP and the students configure the NICs. If you work in groups, each group should choose a different SSID and channel. Perform the following tasks:

• Install the wireless NIC in each computer, if necessary.

• Configure the AP SSID as NetEss, if necessary.

• Connect to the AP from each computer.

• Configure the AP for the following security protocols, if available: WEP, WPA, and WPA2. After you configure the AP for a security protocol, change the wireless NIC configuration to use the same security protocol. Use as many of these protocols as your hardware supports.

• Change the AP's configuration to not use a security protocol and verify that all computers can connect before continuing.

• Configure these options on the AP to see how they affect your client connections; reset each option after you have tested it before moving on to the next option:

Disable SSID broadcasts.

MAC filtering: Configure filtering to allow only one or two computers to connect, and verify that the others can't connect.

• Answer the following questions:

- Which security protocol was the easiest to configure? Which protocol is the most secure?

- How did disabling the SSID broadcast affect your ability to connect to the AP?

- How did MAC filtering affect your ability to connect to the AP?

Reference no: EM131513880

Questions Cloud

The marketing plan for the new product : The board members were very impressed with your presentation and how you are moving through the product development process.
Create and connect to a shared printer : Creating and Connecting to a Shared Printer Time Required: 10 minutes Objective: Create and connect to a shared printer.
Define the properties of vmware player : Downloading and Installing VMware Player Time Required: 20 minutes Objective: Download and install VMware Player.
The product and promotional decisions : Which strategy you think should be used for the target market and why. The second part of the memo should outline a distribution plan.
How did mac filtering affect your ability to connect to ap : Configuring a Wireless Network for Security Time Required: 40 minutes Objective: Install a wireless NIC (if necessary), connect to an access point.
Describe the major functions of the is department : Describe a steering committee and explain the CIO's role with regard to it. Describe the major functions of the IS department.
Which layers of osi model are involved in italicized parts : You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination computer is on another network.
Explain what is meant by security policy : Explain what is meant by denial of service and provide an example to support your answer. Explain what is meant by security policy.
Identify the osi model layer : The OSI model is a useful tool in troubleshooting a network because it enables you to isolate a problem to a particular software module or piece of hardware.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd