CNET324 Lab 4-Wireless VLAN with RADIUS Authentication
.docx
keyboard_arrow_up
School
Centennial College *
*We aren’t endorsed by this school
Course
324
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
22
Uploaded by ColonelPantherPerson857
Lab 5: Wireless VLAN with RADIUS Authentication
Lab 4
Lab 4: Wireless VLAN with RADIUS Authentication *By signing above, you attest that you have contributed to this submission and confirm that all work you have contributed to this submission is your own work. Any suspicion of copying or plagiarism in this work will result in an investigation of Academic Misconduct and may result in a “0” on the
School of Engineering Technology and Applied Science (SETAS)
Information and Computing Engineering Technology (ICET)
CNET 324 - Wireless Networks
Course Lead: Dr. Sattar Hussain Section No.
002
Group No.
06
Obtained Mark
(out of 20)
Due Date
February 12, 2024
Name
Student ID
Signature*
Saad
301284248
S
Shivani Bajaj
301312712
SB
Alka
301281875
A
Lab 5: Wireless VLAN with RADIUS Authentication
Overview
If you use VLANs on your wireless network and assign different SSIDs to these VLANs, you can use
any of the security settings on the Express Security page of the Cisco AP1242G Aironet Access Point.
Without VLANs, encryption settings options apply to an interface are limited. Just as you use the Express Setup page to assign basic setting, you can use the Express Security page
to create unique SSIDs and assign one of four security types to them. For detailed security, refer to the
Cisco IOS Software Configuration Guide for Cisco Access Points
.
When the access point configuration is set to factory defaults, the first SSID that you create by using
the Express Security page overwrites the default SSID, which has no security settings. The SSIDs that
you create appear in the SSID table at the bottom of the page. You can create up to 16 SSIDs on the
access point.
The four security types provided by the Express Setup page are:
No Security: This is the least secure option. You should use this option only for SSIDs used in a
public space and assign it to a VLAN that restricts access to your network.
Static WEP Key: Static WEP keys are vulnerable to attack. If you configure this setting, you should
consider limiting association to the wireless device based on MAC address or, if your network does
not have a RADIUS server, consider using an access point as a local authentication server. EAP Authentication: This option enables 802.1X authentication (such as LEAP, PEAP, EAP-TLS,
EAP-FAST, EAP-TTLS, EAP-GTC, EAP-SIM, and other 802.1X/EAP based products). This setting
uses mandatory encryption, WEP, open authentication + EAP, network EAP authentication, no key
management, RADIUS server authentication port 1645. You are required to enter the IP address and
shared secret for an authentication server on your network (server authentication port 1645). Because
802.1X authentication provides dynamic encryption keys, you do not need to enter a WEP key.
WPA: Wi-Fi Protected Access (WPA) permits wireless access to users authenticated against a
database through the services of an authentication server, then encrypts their IP traffic with stronger
algorithms than those used in WEP.
This setting uses encryption ciphers, TKIP, open authentication + EAP, network EAP authentication,
key management WPA mandatory, and RADIUS server authentication port 1645. As with EAP
authentication, you must enter the IP address and shared secret for an authentication server on your
network (server authentication port 1645).
Learning Objectives
By completion of this lab, students will be able to:
-
Configure VLANs on Cisco Access Points using of the command−line interface (CLI) -
Configure Cisco 2950 Catalyst switch using of the command−line interface (CLI) -
Configure VLANs with RADIUS authentications
-
Test the VALNs connectivity with RADIUS authentication
Required Equipment
-
1 Cisco AP1242G Aironet Access Point
-
2 desktop computers running WINDOWS 7 or Windows 10 operating system
-
2 Laptops with WINDOWS 7 or Windows 10 operating system -
1 Cisco 2950 Catalyst switch
-
2 Whip WiFi 2.4 GHz antennas
Lab 5: Wireless VLAN with RADIUS Authentication
Note: This lab is derived from the application note for AP1242 VLANs on Aironet Access Points
Network Topology
Below is the list of IP addresses used for the devices. All the IP addresses use /24 subnet mask
AP Bridge−Group Virtual Interface (BVI) IP address (VLAN 2): 172.16.1.20
Wireless client (SSID Admin) that connects to VLAN 20 gets a static IP address: 172.16.2.X*
Wireless client (SSID Guest) that connects to VLAN 30 gets a static IP address: 172.16.3.X*
Admin user on the wired network on VLAN 20: 172.16.2.60 (static IP)
Web server on VLAN 30: 172.16.3.60 (Static IP)
* X is any number 2-254
172.16.2.0 subnet
172.16.3.0 subnet
Lab 5: Wireless VLAN with RADIUS Authentication
The numbering plan to be used for this lab is as follows:
Cisco 1242G Factory Setting
Default IP address
10.0.0.1
Subnet Mask
255.255.255.0
User name:
Password:
Cisco
NOTE:
Change LAN settings to static IP address.
Group #
Network Host
Name VLAN to be
used
IP Address
Subnet Mask
1
AP
As per lab instructions
As per lab instructions
255.255.255.0
2
AP
As per lab
instructions
As per lab
instructions
255.255.255.0
3
AP
As per lab
instructions
As per lab
instructions
255.255.255.0
4
AP
As per lab
instructions
As per lab
instructions
255.255.255.0
5
AP
As per lab
instructions
As per lab
instructions
255.255.255.0
6
AP
As per lab
instructions
As per lab
instructions
255.255.255.0
7
AP
As per lab
instructions
As per lab
instructions
255.255.255.0
8
AP
As per lab
instructions
As per lab
instructions
255.255.255.0
Procedure
Important: read the following notes before starting your lab
a)
The following procedure is based on Windows 7. If a different system is used, the procedure
may be slightly different. b)
In each laptop, turn off MacAfee Protection. Turn Off the Windows Firewall for Home or
work (private) networks. Make sure each laptop is disconnected from Centennial WiFi
network.
c)
EACH OF THE PCS , CELLPHONES AND THE AP SHOULD HAVE UNIQUE IP
ADDRESS BUT ALL MUST BE IN THE SAME SUBNET TO COMMUNICATE.
d)
Handle lab equipment with extra care. Dropping or misusing equipment may damage them.
Ask your professor if you are not sure about any step of the lab procedure
e)
Read the label on the power adapter (charger) of the access point. Make sure that you are
using the right one. Using a different charger will damage the wireless access point.
Lab 5: Wireless VLAN with RADIUS Authentication
Task 1: Set up WAP on 802.11g Radio Interface Note: If you have not copied the configuration file from lab 4, repeat these steps exactly as you have done in lab 4
1.
Before you power up the access point
, connect two 2.4-GHz external antennas as shown.
Make sure to connect these antennas to 2.4 GHz side of the AP
. Notice the difference in the
shape of the 2.4 GHz and the 5 GHz antenna. This will help in identifying the 2.4 GHz
antenna. 1.
Use a Hyper terminal or PuTTY to go on CLI.
2.
Use the USB to Serial adapter. Load the drivers if it is required and verify the COMM port by
going through the Device manager.
3.
Set up a terminal emulator on your PC to communicate with the access point. Use the
following settings for the terminal emulator connection: 9600 baud, 8 data bits, no parity, 1
stop bit, and no flow control.
Commands are:
ap > Enable
ap # Config terminal
ap (config) # Interface bvi1
ap (config-if) # IP address 10.0.x.1 255.255.255.0
(Replace x with your group number)
ap (config-if) # end
Exit
4.
Change the Local Area Network (Ethernet) Adapter IP address of to be in the same subnet of
the access point (10.0.x.X) where X any number 2-254.
5.
Open the Browser and type 10.0.x.1. Login with
Username {blank}
Password: Cisco
You should now see the summary status
5 GHz antennas
2.4 GHz antennas
Lab 5: Wireless VLAN with RADIUS Authentication
6.
Go to EXPRESS SET-UP and assign the following:
Host Name
: AP
Configuration Server Protocol
: Static IP
IP Address
: 172.16.1.20
Default Gateway: : Web
Server Address (172.16.3.60)
SNMP COMMUNITY
: defaultCommunity
Role in Radio Network
: Access Point
7.
Click Apply
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Please help with the following:
Make two acceptance test for each user story card.
1.As an employee, I want to be able to delete a blog post so that I can maintain only relevant posts
2.As a supervisor, I want to be able to login so that I can access functionalities restricted to supervisors
arrow_forward
using the diagram below perform the following 3 steps
step 1 Build the above form by incorporating PHP & HTML.
step 2 Ensure that successful completion of the form’s actions will result in a personalised confirmation message stating actions performed. Unsuccessful completion should also be acknowledged.
step 3 Ensure that server-side validation has been performed on the data.
arrow_forward
Can you read this and correct errors if you see them please thank you for some reason bartleby write not working and I need it edit please? Thank you for your time
I chose cybersecurity specialist as my career for several reasons. The main reason is I can provide for my family. I will be able to hire assistants, and we can live more comfortably. Cybersecurity is a technology equipped to protect programs, network, system, and data from cyber-attack. Since the introduction of new technology, adjustment of cyber threats and risk is accumulating for cybercriminal. Today cybersecurity is important because the world uses more technology, and when you use your device more likely cyber-attack can affected. Cybersecurity protects electronic data and information. For my career I desire to stop cybercriminal who are escalating their attacks with advancement from technology. Taking cybersecurity, I would love to fix cyber-attack, yet also protect your device before cybering comes in. The types of…
arrow_forward
Explain which "technique" can be used to provide secure authentication and authorization for the following scenario. Scenario: A company is developing a web application that allows users to sign in with their social media accounts and post updates to those accounts. The company wants to ensure that user data is kept secure and protected, and that users are only authorized to access their own accounts. In your answer, address the following points: 1) Explain the basics of the technique and how it can be used for authentication and authorization. 2) Describe how the technique could be implemented in this scenario to authenticate users and authorize access to their social media accounts. 3) Explain the benefits of using the technique in this scenario. 4) Discuss any potential drawbacks or limitations of using the technique in this scenario.
arrow_forward
Task: Research Network Security Attacks
Each student will search using Internet resources including Cisco NetAcad for the following
information about the network security attacks as given in the table below.
You should add figures to support your explanation.
Answer each of the following questions for the type of security attack provided in the table
below:
1. What is that type of attack?
2. Discuss different types of that attack, if any.
3. How each type of that attack effects the network and users?
4. Give at least five security recommendations to control and prevent that attack.
(Malware (Virus, Worm, Trojans))
arrow_forward
Q) Write a detailed explanation on how cookies work in web
technologies. In your explanation, please address the following points:
Definition: Define what cookies are in the context of web technologies.
Creation and Storage: Explain how cookies are created and where they
are stored.
Usage: Discuss how cookies are used by websites for session
management, personalization, and tracking user behavior.
Security Concerns: Discuss any security concerns associated with the use
of cookies and how they can be mitigated.
Alternatives: Are there any alternatives to cookies in modern web
development? If so, discuss them.
arrow_forward
Please don't copy the answer
arrow_forward
Discuss the following statement: "It is illegal to upload photographs or recordings of someone without their permission." This sentence should make you uncomfortable.
arrow_forward
PLEASE READ THE FULL QUESTION.
This exercise uses your programming environment to enhance the Web site you created last week with additional functionality to include images, tables and a Form using Python flask. Specifically, you will add two (2) additional routes allowing a user to register and login to a web site. Additional security considerations include other routes (beyond the register route) will not be accessible until a successful login has occurred
In addition to the requirements list above the following functionality should be found within your web site on one or more web pages.
A user registration form
A user login form
A password complexity should be enforced to include at least 12 characters in length, and include at least 1 uppercase character, 1 lowercase character, 1 number and 1 special character.
Below I have attached my python code as well as my home page html code. I need assistance creating the registration form and login form and implementing in both an…
arrow_forward
Question::
Case Exercises Amy walked into her office cubicle and sat down. The entire episode with
the blond man had taken well over two hours of her day. Plus, the police officers had told
her the district attorney would also be calling to make an appointment to speak to her,
which meant she would have to spend even more time dealing with this incident. She
hoped her manager would understand.
Questions:
1. Based on this case study, what security awareness and training documents and
posters had an impact in this event?
2. Do you think that Amy should have done anything differently? What would you have
done in the situation in which she found herself?
arrow_forward
Already uploaded answer is wrong
arrow_forward
Alert: Don't submit AI generated answer and propvide detail solution with proper explanation and step by step answer.
Which of the following statements best describes a Trojan?
options:
Malicious software that records every key stroke and mouse movement
Malicious software that takes the computer data hostage to extort money
Malicious software that hides into the lower levels of the operating system and opens a backdoor
Malicious software that disguises itself as a legitimate program
arrow_forward
Which of the following is true about the hack against the credit reporting company Equifax? (Choose 2)
O The attack was considered an act of cyberwarfare.
Hackers were targeting personal information such as credit card numbers.
The attack affected US citizens as well as Canadians and Britons.
The attack was motivated by hackers taking revenge on the credit agency.
The attack was the work of insider hackers.
arrow_forward
Create a presentation containing 14 to 16 slides, including Introduction, Conclusion, and Reference slides. Include detailed speaker notes with each slide.
Scenario: You are a newly hired Cyber Security Consultant for a medium-sized law firm. The U.S. based law firm will be offering legal services to the U.S. technology industry and worldwide tech markets. You are asked by the Board of Directors to explain the concept of internet governance and key privacy issues they can expect potential clients to face. They also would like to know how U.S. and EU public policy may impact potential clients in the technology market so they can make a more informed decision on how best to invest into areas of research to improve customer satisfaction and related legal services. Your task is to:
Accurately define human rights issues in the "cyber domain".
Identify the stances on privacy of key nations (include at a minimum the U.S. and EU).
Accurately describe the influence of public policy on…
arrow_forward
Thank you in Advcance/ This is a computer Ethics Subject .
A company in the Netherlands that makes navigation devices collects location data from the devices to provide real-time services to its customers. It also provides anonymous statistical data to government agencies to improve roads and traffic flow. Unknown to the company and its customers, the police used the data to choose sites for traffic cameras to catch speeders. Was this a privacy violation? Why or why not?
arrow_forward
Several professionals in the field of cybersecurity believe that fingerprinting is unethical and that it violates the privacy concerns of users. A number of browsers have developed methods to avoid leaving a browser fingerprint. Browsers have made many attempts to defend themselves against fingerprint recognition using a variety of methods.
arrow_forward
Match the attack vector with the identified attack
(see attched photo)
You can only choose one attack for each and once used you cannot re-use the attack.
arrow_forward
CASE STUDY 1: AW GUIDE
John Morris recently became a marketing manager of AW Guide, a tour guide
company. Nine months earlier, the company had established a new service: sending a
newsletter through emails to customers notifying them of tour updates and inviting
them to download the latest tours and travel information. The same information is made
available on their corporate website. Customers initially expressed delight with the
service. But in the past month, many customers have complained that the travel
information they received in the emails was out of date. Since then, the company has
received many cancellation requests and had affected the company sales performance.
John realizes that something is wrong with the content-updating and distribution
process he uses for emails and website. But he is unsure how to address the problem.
The lack of use of IT applications in current business processes has also contributed to
a loss of efficiency and customer focus. John has proposed to…
arrow_forward
True or False: HIPAA does not provide for specific circumstances in which law enforcement officers can access PHI
arrow_forward
As you read in Chapter 11, Facebook is one of many online companies that employ databases. In 2011, Facebook announced that it was adding a new feature—facial recognition. Photos added to a Facebook post or wall are often tagged. When a person is tagged in a photo, the person is identified and a link is created to that user’s Facebook account. To make this job easier, Facebook is using facial recognition software to identify people in the photos. Critics of this say that this is an invasion of privacy. Research the debate online. Write a short paper discussing the implications this could have on a Facebook user’s privacy. Please use these sources: https://www.pcworld.com/article/485206/facebook_on_face_recognition_sorry_we_screwed_up.html
https://www.pcworld.com/article/485225/facebook_photo_tagging_a_privacy_guide.html#tk.hp_pop
https://abcnews.go.com/Technology/facebook-facial-recognition-feature-raises-eyebrows/story?id=13792666
arrow_forward
QUESTION 5
You have hired an outside firm to develop a new vebsitie for your company. The purpose of the website is to allow your customers to create accounts that will store their
personal information (name, address, phone number, email, etc) as well as their payment information (credit card numbers, expiration dates, etr.) Before making the site
available to customers your IT department runs a few tests by setting up fake accounts and looking at the records that the website generates. You find the information
below in the report that the IT department sends you: it shows the password that they used for two of the test accounts as well as the hashed version of the password that
will be stored on your company's servers (The format of the report provides the users password within quotation marks and the hash of the password following the
symbol)
A Meow12 edff4dc2760bilce800b193805471caedlo66338)
8, "Meow124" cutfadc276abscesoob193805471caeate6337
Based on this information, what can you…
arrow_forward
Describe how a wireless access point works and the association process.
Assignment RequirementsYou are a networking consultant for Secure Systems Solutions (SSS), specializing in wireless and mobile device security. SSS strives to be active in community affairs. The parent-teacher organization within the local school district is planning to host a technology learning event aimed at junior high school students. The organization has come to SSS for assistance. Your manager has asked you to prepare a presentation for the students that describes how a wireless access point works.
1. Develop a presentation that includes:
• The purpose of a wireless access point
• The purpose of antennas
• The association process
arrow_forward
Essay: The Web and Security
Instructions
The internet and the web are separate entities that work together to allow communication. The internet provides the infrastructure and the web provides web applications to enable communications and services. Yet, along with the benefits they provide, the internet and the web have created a risk for our data to be stolen.
As evidenced in the study material for this week, keeping the data transmitted through the web secure and confidential is paramount to the effectiveness of all online communications. Hence, security protocols have been developed to provide encryption to mitigate the risk for data theft.
Write an essay explaining encryption and the use of security protocols used today. Discuss the various levels of encryption and which protocols secure the web applications. Describe how they work to keep communications safe on the web. Investigate various web applications used, including e-commerce and social media, and report on the encryption…
arrow_forward
Q2- A security threat exists when an unauthorised user is fraudulently accessed the sensitive record and modified it. Briefly describe possible ways that can mitigate this attack and how.
(If you can please identify 5 possible way or as much as you can
arrow_forward
Please offer some actual instances to show the differences between illegally downloading something online and infringing upon someone else's intellectual property.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Please help with the following: Make two acceptance test for each user story card. 1.As an employee, I want to be able to delete a blog post so that I can maintain only relevant posts 2.As a supervisor, I want to be able to login so that I can access functionalities restricted to supervisorsarrow_forwardusing the diagram below perform the following 3 steps step 1 Build the above form by incorporating PHP & HTML. step 2 Ensure that successful completion of the form’s actions will result in a personalised confirmation message stating actions performed. Unsuccessful completion should also be acknowledged. step 3 Ensure that server-side validation has been performed on the data.arrow_forwardCan you read this and correct errors if you see them please thank you for some reason bartleby write not working and I need it edit please? Thank you for your time I chose cybersecurity specialist as my career for several reasons. The main reason is I can provide for my family. I will be able to hire assistants, and we can live more comfortably. Cybersecurity is a technology equipped to protect programs, network, system, and data from cyber-attack. Since the introduction of new technology, adjustment of cyber threats and risk is accumulating for cybercriminal. Today cybersecurity is important because the world uses more technology, and when you use your device more likely cyber-attack can affected. Cybersecurity protects electronic data and information. For my career I desire to stop cybercriminal who are escalating their attacks with advancement from technology. Taking cybersecurity, I would love to fix cyber-attack, yet also protect your device before cybering comes in. The types of…arrow_forward
- Explain which "technique" can be used to provide secure authentication and authorization for the following scenario. Scenario: A company is developing a web application that allows users to sign in with their social media accounts and post updates to those accounts. The company wants to ensure that user data is kept secure and protected, and that users are only authorized to access their own accounts. In your answer, address the following points: 1) Explain the basics of the technique and how it can be used for authentication and authorization. 2) Describe how the technique could be implemented in this scenario to authenticate users and authorize access to their social media accounts. 3) Explain the benefits of using the technique in this scenario. 4) Discuss any potential drawbacks or limitations of using the technique in this scenario.arrow_forwardTask: Research Network Security Attacks Each student will search using Internet resources including Cisco NetAcad for the following information about the network security attacks as given in the table below. You should add figures to support your explanation. Answer each of the following questions for the type of security attack provided in the table below: 1. What is that type of attack? 2. Discuss different types of that attack, if any. 3. How each type of that attack effects the network and users? 4. Give at least five security recommendations to control and prevent that attack. (Malware (Virus, Worm, Trojans))arrow_forwardQ) Write a detailed explanation on how cookies work in web technologies. In your explanation, please address the following points: Definition: Define what cookies are in the context of web technologies. Creation and Storage: Explain how cookies are created and where they are stored. Usage: Discuss how cookies are used by websites for session management, personalization, and tracking user behavior. Security Concerns: Discuss any security concerns associated with the use of cookies and how they can be mitigated. Alternatives: Are there any alternatives to cookies in modern web development? If so, discuss them.arrow_forward
- Please don't copy the answerarrow_forwardDiscuss the following statement: "It is illegal to upload photographs or recordings of someone without their permission." This sentence should make you uncomfortable.arrow_forwardPLEASE READ THE FULL QUESTION. This exercise uses your programming environment to enhance the Web site you created last week with additional functionality to include images, tables and a Form using Python flask. Specifically, you will add two (2) additional routes allowing a user to register and login to a web site. Additional security considerations include other routes (beyond the register route) will not be accessible until a successful login has occurred In addition to the requirements list above the following functionality should be found within your web site on one or more web pages. A user registration form A user login form A password complexity should be enforced to include at least 12 characters in length, and include at least 1 uppercase character, 1 lowercase character, 1 number and 1 special character. Below I have attached my python code as well as my home page html code. I need assistance creating the registration form and login form and implementing in both an…arrow_forward
- Question:: Case Exercises Amy walked into her office cubicle and sat down. The entire episode with the blond man had taken well over two hours of her day. Plus, the police officers had told her the district attorney would also be calling to make an appointment to speak to her, which meant she would have to spend even more time dealing with this incident. She hoped her manager would understand. Questions: 1. Based on this case study, what security awareness and training documents and posters had an impact in this event? 2. Do you think that Amy should have done anything differently? What would you have done in the situation in which she found herself?arrow_forwardAlready uploaded answer is wrongarrow_forwardAlert: Don't submit AI generated answer and propvide detail solution with proper explanation and step by step answer. Which of the following statements best describes a Trojan? options: Malicious software that records every key stroke and mouse movement Malicious software that takes the computer data hostage to extort money Malicious software that hides into the lower levels of the operating system and opens a backdoor Malicious software that disguises itself as a legitimate programarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning