CWNA

Duration - 4 Days
Enterprise Wi-Fi Administration (CWNA-107)

Learn to successfully survey, install, and administer enterprise-class Wi-Fi networks.

The CWNA certification is the advanced-level enterprise Wi-Fi certification for the CWNP Program.
Achieving it sets your wireless career on a firm foundation, ensuring you have the skills to successfully
survey, install, and administer enterprise Wi-Fi networks.
In this hands-on course, you will gain a full understanding of how radio frequency affects networking so
you can perform site surveys, design a high-performance network, and protect both users and sensitive
data from potential intruders. Plus, you will explore advanced topics such as Voice over WLAN
deployments, seamless mobile connectivity, and detailed wireless frame analysis. You will use enterprise-
class hardware and software tools during live lab exercises, simulating a state-of- the-art production
environment.

What You’ll Learn

  • Radio frequency properties, behaviors, and regulations, and how they affect networking
  • Wireless standards, including 802.11 extensions a, b, g, n, ac, ax
  • General troubleshooting tips to common real-world 802.11n/ac/ax issues
  • General parameters for performing a successful site survey, along with software tools that reduce time and expense
  • Device-level Wi-Fi communications processes
  • Why 802.11n/ac networks operate the way they do and how to apply that knowledge when faced with problems that stump most network administrators
  • Using wireless network analyzers to capture live data and pinpoint potential network issues
  • How using radio frequency makes wireless networks vulnerable
  • Most common wireless threats and how to detect and defend against them
    Wireless security standards for keeping unauthorized users out and maintaining wireless data privacy
  • Applying WPA2 security standards, including 802.1X/EAP and AES, along with the devices used to apply them
  • Wireless intrusion detection and why it's essential for maintaining a secure network

Who Needs to Attend

  • Administrators: network, systems, infrastructure, security, and LAN/WLANs
  • Support professionals: technical assistance and field support
  • Designers: network, systems, and infrastructure
  • Developers: wireless software and hardware products
  • Consultants and integrators: IT and security
  • Decision makers: infrastructure managers, IT managers, security directors, chief security officers, and chief technology officers

Prerequisites

  • TCP/IP Networking

Course Outline

1.WLAN Infrastructure

  • The Basic Service Set
    Access Points

    • Basic AP Operation
  • WLAN Controllers
  • Wi-Fi Stations
    • Wi-Fi Client Software
  • Independent Basic Service Set (IBSS)
    • o Service Set Identifier
    • o The Extended Service Set

2.WLAN Standards

  • WLAN Organizations
    • The IEEE
    • The Wi-Fi Alliance
    • IETF
  • The IEEE 802.11 Standard
    • The 802.11 Physical Layer
    • The 802.11 MAC Layer
  • 802.11 Amendments
    • 802.11a (OFDM)
    • 802.11b (HR/DSSS)
    • 802.11g (ERP)
    • 802.11n (HT) and 802.11ac (VHT)
      • 802.11n and .11ac Improvements
        • Speed
        • Range
        • Power Consumption
      • MIMO and MU-MIMO Operation
  • 802.11 and Wi-Fi
    • 802.11 Amendments and Wi-Fi Certifications

3.RF Fundamentals

  • Channels and Bands
    • 2.4 GHz Channels
    • 5 GHz Channels
  • Modulation and Coding
    • DSSS
    • OFDM
  • RF Math
    • Watts and Milliwatts (mW)
    • Decibels (dB), dBi, and dBm
  • Multipath
    • Identifying Multipath
    • Solving Multipath Problems

4.Antennas and Outdoor Wireless

  • Link Budgets
    • Reading Signal Strength
    • Transmitter Power
    • Measuring Antenna Gain
    • Cables, Connectors, and Accessories
    • Signal Propagation
  • Antenna Operation
    • Baseband RF to Radio Waves
  • Antenna Types
    • Omnidirectional Antennas
    • Semidirectional Antennas
    • Highly Directional Antennas
  • Antenna Coverage Patterns
    • Antenna Beamwidth
    • Antenna Mounting

5.WPA/WPA2 Authentication

  • 802.11 Security Amendments
  • 802.11i Robust Security Networks
    • RSN Authentication Options
  • Preshared Key
    • Small Network
    • PSK Vulnerability
    • Pre-shared Key Design
  • 802.1X
    • Extensible Authentication Protocol
    • 802.1X/EAP Design
  • 802.1X/EAP Authentication
  • Mutual Authentication and Key Negotiation
    • Enterprise Authentication
    • EAP-TLS
    • EAP-PEAP
    • Choosing an EAP Type

6.WPA/WPA2 Encryption

  • WLAN Encryption
    • Wired Equivalent Privacy
  • WPA/WPA2 Encryption Options
  • RC4 Encryption
    • Secure Stream Cipher
  • TKIP Improvements
    • TKIP Operation
  • AES-CCMP
    • AES-CCMP Similarities to TKIP
    • AES-CCMP Operation
  • 802.11i Encryption Summary
    • Automatic Encryption Selection
    • Encrypting in the Real World

7.WLAN Operation

  • 802.11 Channel Access
  • CSMA/CA
    • A Clear Channel
  • Interframe Spacing
  • Random Backoff Time
    • The Contention Window
    • Winning Arbitration
  • Acknowledgements
    • After the Acknowledgement
  • An Arbitration Example
    • Timelines
    • IFS Timeless
    • Backoff Timelines
    • Frame Timelines
    • ACK Timelines
  • Effects of Arbitration

8.Mixed Mode Operation

  • Mixed Mode Networks
  • 802.11b/g Mixed Mode
    • Protection Mechanism
    • Enabling Protection
  • 802.11g/n Mixed Mode )
    • 802.11n Greenfield
    • 802.11 g/n Mixed Mode AP
    • Nearby 802.11g AP
  • 802.11n 2.4 GHz Problems
  • 802.11n 5 GHz
  • Mixed Mode Best Practices

9.Security Design

  • RSN Concerns
    • General Security Approach
  • Wireless Data Security
    • Eavesdropping
    • Encryption Options
  • Network Security
  • Guest Access
    • Captive portals
    • Captive portal vulnerabilities
  • RF Denial
    • Client Testing Software
    • DoS: Connection Loss
    • DoS Response
    • Network Rogue APs
    • Rogue AP Response
  • MAC Address Spoofing
  • Endpoint Security
    • Evil Twin Rogue APs
    • ESS
    • NAC
  • Enterprise WIDS
    • Enterprise WIDS Types
    • Enterprise WIDS Monitoring
    • WIDS Rogue Prevention
    • Enterprise WIDS Summary
  • Security Design Best Practices

10.Troubleshooting Station Connections

  • Common Station Problems
  • Radio On/Off Switches
  • Wi-Fi Client Utilities
    • Automatic SSID Configuration
    • Manual SSID Configuration
    • Security Configuration
  • Power Management Protocols
    • Power states and modes
    • 802.11 Power Management
    • Automatic Power Save Delivery
    • Power Management Settings

11.WLAN Analysis

  • Packet Capture
    • Passive Monitoring
    • Monitor Mode
  • Protocol Analysis Software
  • The Wi-Fi Connection
    • Beyond Basic Troubleshooting
    • The 802.11 State Machine
  • Discovery Analysis
  • Authentication and Association/li>
  • Roaming
  • Secure Connections
    • WEP Connections
    • PSK Connections
    • 802.1X/EAP Connections
  • Connection Loss

12.WLAN Channel Analysis

  • Analyzing the Channel
  • Using the Protocol Analyzers
    • Filtering
  • Basic 802.11 Overhead
    • Wi-Fi Collisions
  • Channel Efficiency
    • 802.11 Retrys
  • Performance Degradation
    • Interference Types
  • Spectrum Analyzers
    • Distributed Spectrum Analyzers
    • Spectrum Analyzer Troubleshooting

13.Enterprise Infrastructure Design

  • Basic AP Configuration
  • Enterprise WLAN Needs
    • Optional AP Settings
  • Wireless Network Management Systems
    • Controller-less WLANs
  • Wireless VLANs
    • Wireless VLAN Security
  • Power over Ethernet
    • Power sourcing equipment
    • Powered devices
    • Detection and classification
  • Picocells
    • Power Output Settings
    • Channel Reuse
    • Redundancy
  • Client Isolation
  • RTS/CTS
    • RTS/CTS Protocol
    • RTS/CTS Thresholds
    • RTS/CTS Uses
  • AP Optimization Best Practices

14.Station Optimization

  • Station Configuration
  • Additional Station Settings
    • Roaming Tendency
    • Disable Upon Wired Connect
    • Single Sign-on
  • Station Optimization Best Practices

15.QoS Configuration

  • Legacy WLANs
    • QoS Needs
  • QBSS Load
  • Enhanced Distributed Channel Access
    • AIFSN Lengths
    • The Contention Window (QoS)
    • Transmit Opportunity
    • TXOP and Contention-Free Burst
  • Priority Settings
  • QoS Configuration Best Practices

16.Channel Optimization

  • RF Difficulties
    • Handling RF Problems
  • Roaming
    • Roaming Behavior
    • Roaming Problems
    • Cell Overlap
  • Common WLAN Types
    • Basic-Coverage WLANs
    • High-Density WLANs
    • Application-Based WLANs
  • Alternative technologies
    • Role-based access control
    • Transmit beamforming
    • Virtual Cells
    • Controller-less management
    • Multi-radio APs
  • Channel Optimization Best Practices

17.Site Surveys

  • Radio Frequency Problems
  • Site Surveys
    • Pre-Installation Surveying
  • Kit Preparation
  • WLAN Simulation Software
    • Predictive Coverage
    • High Cost, High Benefit
  • Post-Installation Surveying
    • Performing Spot Checks
  • Live Survey Software
    • Coverage Mapping
    • Survey Reporting
  • Site Survey Best Practices

18.Next-Generation WLANs

  • Next-Generation Improvements
  • Automatic RF management
    • Band Steering
    • Airtime management
  • Wi-Fi Direct
  • Secure Roaming
    • Fast Transition Basics
    • Fast Transition Options
    • WMM Voice Enterprise
  • Mesh Networks
    • Mesh Networking Technology
    • Outdoor Access
    • Consumer Wi-Fi Technologies
  • Home Media Streaming
    • Direct Link Setup
    • Software-Based APs
    • Software-Based AP Uses
  • Wi-Fi Cellular Calling

Labs

  1. WLAN Client Management
  2. WLAN Protocol Analyzers
  3. WLAN Wi-Fi Analyzers
  4. Spectrum Analyzers
  5. WLAN Configurations
  6. Connection Analysis
  7. Performance Analysis
  8. VoWLAN Setup and Testing
  9. Roaming
  10. Site Survey: Planning/Simulation
  11. Wireless Security