Vous êtes sur la page 1sur 119

Cisco Small Business

Wireless Connectivity
Solutions (CSBWC v2.0)

2009 Cisco Systems, Inc. All rights reserved.

Objectives
Upon completion of this session, you will be able to:
Describe the components and functions of Wireless LANs.
Explain Cisco Wireless LAN solutions for Small and Medium
customers.
Identify the main hardware components of the Cisco Small
Business Wireless Product Families.
Solve typical deployment scenarios, common in th e day-to-day
operations.

2009 Cisco Systems, Inc. All rights reserved.

Course Introduction

2007 Cisco Systems, Inc. All rights reserved.

ICND1 v1.03

Student Skills and Knowledge


Computing fundamentals
Basic Windows navigation skills
Basic skills in the use of Internet.

2009 Cisco Systems, Inc. All rights reserved.

Course Objective
Provide the knowledge and skills set necessary to
understand how to create and implement wireless
networks that are effective and efficient, for Small
and Medium Customers

Cisco Small Business Wireless Connectivity Solutions v2.0

2009 Cisco Systems, Inc. All rights reserved.

General Administration
Course-related

Facility-related

Class roster.
Lengths and durations.

Students materials.
Emergency procedures.

Break and service areas.

Services.
Telephone and Fax.

2009 Cisco Systems, Inc. All rights reserved.

Agenda
Day 1

A
M

Course Introduction
Product Families for
Wireless Connectivity
Solutions

LUNCH

P
M

Connecting Small and


Medium Networks.
Typical Scenarios

2009 Cisco Systems, Inc. All rights reserved.

Students Presentation
Your name.
Your company.
Job responsibilities.
Skills and knowledge.
Short history.
Objective.

2009 Cisco Systems, Inc. All rights reserved.

The Small Business Challenge

2009 Cisco Systems, Inc. All rights reserved.

Cisco is committed to small and medium


customers

2009 Cisco Systems, Inc. All rights reserved.

Why Now?
%
Employee
Change

Faster recovery
after dot-com
bust and 9/11

Faster recovery
after recession

5
4
3
2
1
0

1989

1990

1991

1992

1993

1994

1995

1996

1997

1998

1999

2000

-1
-2

<500 employees

-3
-4

Harder impact
from recession
Data Source: US Census Data
2009 Cisco Systems, Inc. All rights reserved.

500+ employees

2001

2002

2003

The Recovery Cycle is Faster

Specially for companies under 500 employees


Faster recovery in
spite of recession

Faster recovery in spite


of dot coms and 9/11

5.0%
4.0%
3.0%

Porcentual Change in
Employment

2.0%
1.0%
0.0%

1989

1990

1991

1992

1993

1994

1995

1996

1997

1998

1999

2000

2001

2002

2003

-1.0%
-2.0%
-3.0%

<500 employees

>500 employees

-4.0%

Lower impact
in small
companies

Lower impact
in small
companies

Data Source: US Census Data


2009 Cisco Systems, Inc. All rights reserved.

The Cisco Opportunity for Small


Business

$15.9B
<250 employees
<100 employees

$9.9B

Calendar Year 2009


Source: Cisco GMV, Sept 2008
2009 Cisco Systems, Inc. All rights reserved.

Includes:
Switches LAN, routing,
network security, content
security, voice, storage,
unified communications
and wireless LANs

Why Cisco?
Unique DNA for
small customers

Technology
Reliability
Services
A-la-carte solutions
VARs
Network as
a platform

IT as a service
Value
Easy to use
Products
Commercialization channel
2009 Cisco Systems, Inc. All rights reserved.

How much does a Cisco Channel gets


when it is Certified as SMB Select

2009 Cisco Systems, Inc. All rights reserved.

Why Certify as Cisco Select?


Benefit from an extensive product offering, solutions, programs, resources
and tools for you and your small customers.

Service
and
Support

Distribution
Partners

Productivity
Resources

Profitable
programs
2009 Cisco Systems, Inc. All rights reserved.

Marketing and
Demand
Generation

Association
with Cisco

Differentiation

Wide portfolio
of products
and solutions

Whole Offer
DISTRIBUTION VALUE ADD:
Busines Planning, Cisco Relations, Pre-post Sales, Marketing,
Training, Demo Kits, Professional Services, Information, etc.
TMM/ ICAM

PDF/UC 2/3/8%
Select JMF

OIP / PDR 6%
Registered Brand

Select Brand

Incentives: Cisco Rewards, Registered Reseller Payment Program


Price Support, DSA/DARTs
Promotions: Fast Track 4 Tracks, NFR, CTMP
No Benefits

Enablement: IDEA2.0, IDEA Labs, Partner Education Connection, SMB University


Cisco.com Tools SMB Smart Designs, Smart Business Roadmap, Campaign Builder,

Unregistered
2009 Cisco Systems, Inc. All rights reserved.

PDF Program Overview: Partner


Development Funds
PDF is a cash back program, designed to increase the profitability for Cisco
Channels, while they create their commercial practice and their business around
Cisco Small Business

Quarterly Payments
- PDF makes quarterly payments to qualified partners for their purchases
on Cisco Small Business and Cisco Commercial products
-Provides a roadmap specifically design to benefit the partners, based on
their level of Cisco education an certification

A single tool to control the progress


- The program platform provides an integrated system in which enrolled
partners can follow up their orders, and receive their payments from
multiple Cisco programs, worldwide
2009 Cisco Systems, Inc. All rights reserved.

The PDF program tracks Non-specialized or noncertified partners


Program Details

For Registered
partners,non specialized,
non certified

SB PDF Cash
Back Basic

Final payment: up to 5%/$ per


SKU
Products: SB, SB Pro (no
voice ) SPA phones

2009 Cisco Systems, Inc. All rights reserved.

The SB Market

2009 Cisco Systems, Inc. All rights reserved.

Understanding the Market


Jocelyn Faust, analyst at Gartner, notes that in order to
succeed on the SB space, the channels must answer the
following SB concerns:
Will it save money? Faust maintains that the IT projects that will
save money, are those who get the financing.
Will it work with my existing equipment? Investment protection is
essential in the SB space, according to Faust. If it is plug-andplay, it is more likely to be adopted.
Will it grow with the business? Small and medium customers tend
to anticipate grow, and would like to know if the technology will be
able to grow with them.
Do you understand my business? SB customers understand their
needs are very different from those for big companies, and want
to make sure their AM or reseller understand their unique needs.
2009 Cisco Systems, Inc. All rights reserved.

The SB Challenge
Security?

Resources?

Expansion?

Flexibility?

Productivity?
Oh,
and I need
to buy my
wifes
bithday
card!!!

2009 Cisco Systems, Inc. All rights reserved.

Disaster Recovery?

Customer
Service?

Main Challenges of SB Customers


Lack of Resources
Solution:
Convergent Network
Easy to deploy
Easy to manage
Highly available

Competitive
Pressure
Solution:
Minor Total Cost
Better response to
customers
Less time to market

Main Concerns

Securing Business
Assets
Solution:
Self Defending Network

Source: Cisco Focus Groups CY2005


2009 Cisco Systems, Inc. All rights reserved.

Investment
Protection
Solution:
Leverage of prior
investment
Easy to migrate
Allows future growth

Operational
Efficiency
Solution:
Smart, simple, secure
infrastructure
Integrated applications
Higher productivity

Recommendations
Understand your customer and the business
If you understand their business problems, you can identify the
product features that will change it
Diagnose before you propose
Listen and qualify, and be patient; if you talk too soon, you might end
up loosing your customer attention and finishing the conversation
Find your customer's need, their driver and main concern, and
build a value proposition accordingly
Without this, the customer has the option to do nothing
The higher the value, the faster the customer will buy, and will be
less prone to asking for discounts

2009 Cisco Systems, Inc. All rights reserved.

Wireless Networks
Challenges and Opportunities

2009 Cisco Systems, Inc. All rights reserved.

Business Example: University

Having network connectivity in


classrooms, library, meeting
rooms, etc., using wired media is
expensive and complex at the time
of deployment.

2009 Cisco Systems, Inc. All rights reserved.

Business Example: Hotel

Implementing Internet
access as a service for hosts
in their rooms and common
areas, swiming pool, lobby,
etc is very demanding
specifically when we talk
about structured cabling.
2009 Cisco Systems, Inc. All rights reserved.

The Solution

Deploying a WLAN easily


enables the posibility of
providing network access in
every area in which it is
needed, whithout the
problems and limitations of
deploying a strucutred cabling
project.

2009 Cisco Systems, Inc. All rights reserved.

Value Proposition

2009 Cisco Systems, Inc. All rights reserved.

Why a WiFi Network?


They are perfectly compatibles and act as an extension to the existing
Ethernet LAN.
Eliminates the need for cabling.
Introduces in the network design the concept of dynamic topology, and the
possibility of nomad and/or mobile devices.
Is standardized.
The interoperability with different vendors is guaranteed by the WiFi
alliance.
Uses non-licensed frequency bands.
Allows services equivalent to those available in wired standard networks:
security and QoS

2009 Cisco Systems, Inc. All rights reserved.

Compatibility with pre-existing networks


IEEE 802.11 networks operate in layers 1 and 2 of the OSI model.
On top of them, any network protocol can operate.
Consequently, all the applications that run in IP networks can run in
WiFi networks*.
Their utilization is transparent for the end user.
Nowadays, all of the security and quality of service services that can be
deployed on top of the wired network, can be extended homogeneously
to the wireless network.
* Remember that applications with specific requirements, in terms of response time or operation time at the data link layer
can face problems in 802.11 networks.

2009 Cisco Systems, Inc. All rights reserved.

Standard

Standard defined by IEEE under number 802.11.


Physical and data link layers operations.
Physical and data link layer operation for high speed
networks.
Security and extended security.
Roaming.
Quality of service.

2009 Cisco Systems, Inc. All rights reserved.

Wi-Fi alliance
Is a nonprofit international association formed in 1999, with Cisco
as a founding member.
Certifies interoperability of WLAN products based on the IEEE
802.11 specification.
Certifies interoperability between wireless products of all vendors.
Certifies all compliant devices with the Wi-Fi brand.

2009 Cisco Systems, Inc. All rights reserved.

Non-licensed bands

Advantages:
Facilitates and simplifies network deployment and operation.
Eliminates the need for administrative paperwork with
regulatory organisms for tits operation.
Lowers equipment costs.
Higher availability of products and options.
Disadvantages:
No exclusivity in the use of the frequency bands.
The same frequency bands are used by other developments:
Bluetooth, wireless phones, etc.

2009 Cisco Systems, Inc. All rights reserved.

Unified Services
With the definition of extended security and quality of service in
wireless networks, there is now a possibility to develop unified
networks in which services are provided transparantly for the end
user, no matter if the network is wired or wireless.
Access security.
Authentication, encryption and integrity.
IPSec VPNs.
Quality of service and traffic prioritization.
This has made possible the extension of the wireless network, not
only to secure networks, but to IP Telephony, video over IP, music,
etc.

2009 Cisco Systems, Inc. All rights reserved.

SB Customers Network Requirements

2009 Cisco Systems, Inc. All rights reserved.

SB Customers Network Requirements


Scalable.
Manageable.
Cost-effective.
Highly available.
Service offering as: QoS,
Multicast, Security.
Multiprotocol.
Mobility

2009 Cisco Systems, Inc. All rights reserved.

Future Growth Requirements


Unified Communications.
Wireless networks.
Gigabit to the Desk.
Applications services.
Enhanced security.
Managed services for
customers.

2009 Cisco Systems, Inc. All rights reserved.

IEEE 802.11 Technology

2009 Cisco Systems, Inc. All rights reserved.

802.11
Standard technology for interconnecting networks wirelessly, defined
by the IEEE
Uses low power frequency bands, unlicensed.
Defines both the physical and the data link layers.
Allows the operation of multiple protocols at the network
layer.
Provides bridging mechanisms to operate as an extension
to Ethernet networks.
To identify end devices at the layer 2, uses MAC addresses,
48 bits long.
Provides different ways for interconnecting devices.

2009 Cisco Systems, Inc. All rights reserved.

802.11 Architectures
Provides different network architecutres:
ad-hoc systems.
Infrastructure systems.
Basic
Extended
Wireless mesh (802.11s).
Bridged links.
Point-to-point bridging.
Point-to-multippoint bridging.

2009 Cisco Systems, Inc. All rights reserved.

802.11Architectures
ad-hoc systems

Connecting 2 end devices, point-to-point, without


the need for an intermediate networking device.
Can establish only one communication
at a time.
One end device acts as a master and
the other one as the slave.
In corporate networks, the ad-hoc
systems are considered a potential
security risk.

2009 Cisco Systems, Inc. All rights reserved.

802.11 Architectures
Basic Infrastructure

Wireless access to the wired network through


an access point.
The access-point acts as a client
concentrator and bridge between the
wired and wireless networks.
There is no direct communication
between end users, everything
happens through the access point.

2009 Cisco Systems, Inc. All rights reserved.

802.11Architectures

Extended Infrastructures

Wireless access to the wired network through a


set of access points.
There is an extended coverage area with
wireless access.
The access points can establish
connections with each other, to enable
roaming for the end devices.
The wired networks is usually called
Distribution System.

2009 Cisco Systems, Inc. All rights reserved.

802.11Architectures
Wireless Mesh

Extended infrastructure system in which only a


few of the access points have a direct connection
to the wired network.
The coverage extension is done
establishing wireless links between
access points.
Requires the implementation of protocols
that manage the mesh.

2009 Cisco Systems, Inc. All rights reserved.

802.11 Architectures
Bridged Links

Wireless link that uses IEEE 802.11 co connect 2


LAN networks using radio-frequency.
The access-point (bridges) do not
connect end clients but they connect to
each other.
One operates as a master and the other
one as a slave.
Cover distances of tens of meters to
kilometers, depending on the frequency,
power, antenna and link conditions.

2009 Cisco Systems, Inc. All rights reserved.

Physical Layer

902 928 MHz


902 928 MHz

2.4 2.4835
2.4 2.4835
GHZ
GHZ
802.11b and g
802.11b and g

X Ray

Ultraviolet

Visible Light

infrared

High Frequency

Medium
Frequency

Low
Frequency

Frequency

5.150 a 5.825
5.150 a 5.825
GHZ
GHZ
802.11a
802.11a

The technologies deployed for WLANs are based on unlicensed


bands. There are 3 ranges of frequencies known as unlicensed.
Frequencies used in WLAN are known as ISM and UNII.

2009 Cisco Systems, Inc. All rights reserved.

Regulatory Organisms
The use of unlicensed frequencies depends on the approval from
regulatory agencies in each country.
Some regulatory agencias and other known organisms are:
The FCC as regulatory entity for USA.
The ETSI as regulatory entity for Europe.
The IEEE defines the standard 802.11 as part of the
networking standards grouped as IEEE 802.
The Wi-Fi alliance certified interoperability for devices from
different vendors.

2009 Cisco Systems, Inc. All rights reserved.

IEEE Standards
IEEE 802.11b
2.4 GHz

IEEE 802.11g
2.4 GHz

IEEE 802.11a
5 GHz

IEEE 802.11n
2.4 / 5 GHz

Ratified on

1999

2003

1999

2009

Frequency

2.4 GHz.

2.4 GHz.

5 GHz.

2.4 or
5 GHz.

Possible
Channels

12 / 23

N/A

DSSS

DSSS
OFDM

OFDM

MIMO
DSSS
OFDM

Transmission
Rate. (Mbps)

1, 2, 5.5 and 11

1, 2, 5.5 y 11
6, 9 , 12, 18,
24, 36, 48 and
54

6, 9, 12, 18,
24, 36, 48 and
54

Up to 600
Mbps.

Throughput max.

6 Mbps.

22 Mbps.

28 Mbps.

230 Mbps (actual).

Transmission

2009 Cisco Systems, Inc. All rights reserved.

The Cell
When we start an access point, there is an
area of coverage that is generatet, in which
we can receive the radion frequency signal
transmitted by the cel, with a power enough
to establish a link between the AP and a
client. This is known as the CELL.

2009 Cisco Systems, Inc. All rights reserved.

The Cell
The size of the 802.11 cell depends of:
The APs transmission power.
This power is limited by local regulations for the RF usage.
Interference in the air.
Is variable, and in some cases might be mitigated or avoided.
Sensitivity of the receiving client.
Is a technical parameter provided by the manufacturer.

2009 Cisco Systems, Inc. All rights reserved.

Repeaters
Are access points that repete the APs signal, with the objective to
extend the coverage area.
This is NOT a solution described in the standard.
By extending the cell, the same bandwidth is being provided,
now for more users.
Reduces the performance in 50%.

2009 Cisco Systems, Inc. All rights reserved.

Transmission Rates
IEEE 802.11 networks have a variable transmission rate:
Directly depends on the type of modulation (DSSS or OFDM)
and coding (BPSK, QPSK, QAM) used.
The better the signal quality, the more complex the coding
mechanism, and so, the higher the transmission rate.
As the signal degrades when we get away from the
transmitter, the transmission rate is reduced while we go away
from it.
The transmission rate is dynamically negotiated between the
transmitter and receivers, and varies, but this negotiation is
transparent for the end user.

2009 Cisco Systems, Inc. All rights reserved.

Transmission Rates
The transmission rate depends on the location of the wireless
client, with respect to the AP:
The highest the transmission rates, the more power they need in order
to get to the receiver. When a client goes far from the AP, the
transmission rate decreases.
Wireless clients always try to communicate at the highest transmission
rate possible.
The client will reduce the transmission rate only if it reports errors and
transmission re-tries.

2009 Cisco Systems, Inc. All rights reserved.

Transmission Rates
Comparing coverage radios for Aps working at the different
standars, in office environments, obstacle-free:

16 m.

33 m.

50 m.

66 m.

83 m.

100 m.

116 m.

For this comparison, we have used:


2.4 GHz AP operating with default power and 2.2 dBi antennas, and clients with 0 dBi antennas.
5 GHz AP operating with default power and 5 dBi antennas, and clients with 6 dBi antennas.

2009 Cisco Systems, Inc. All rights reserved.

Channel Definition
IEEE 802.11 defines the use of 22 MHz channels for the
establishment of the links:
FCC defines for USA 11 22 Mhz. Channels, numbered from 1 to 6.
ETSI defines for Europe 13 22 Mhz. Channels.
Each channel is identified by the frequency inside of it.
The begining of every channel is separated by 5 Mhz.
Consequently, consecutive channels are overlapped, and can
generate interference over each other.
The design recommendation is that when you install more than 1 AP, 4
channels are not used between the channels the different APs use.
This measure reduces interference and therefore optimizes the
throughput available in each cell.
2009 Cisco Systems, Inc. All rights reserved.

2.4 GHz Channels.


Channel

Frequency

USA
Argentina

Europe
Asia

Japan

2401 - 2423 MHz

2406 - 2428 MHz

2411 - 2433 MHz

2416 - 2438 MHz

2421 - 2443 MHz

2426 - 2448 MHz

2431 - 2453 MHz

2436 - 2458 MHz

2441 - 2463 MHz

10

2446 - 2468 MHz

11

2451 - 2473 MHz

12

2456 - 2478 MHz

---

13

2461 - 2483 MHz

---

14

2473 - 2495 MHz

---

---

2009 Cisco Systems, Inc. All rights reserved.

Channel Reuse
In order to be able to enjoy the bigger throughput available,
adjacent cells should use non-overlapping channels. This way,
initially, we could only generate 3 cells.
However, while 2 adjacent cells do not use the same channel, the
same efficiency and optimization criteria is used.
Locating the cells in a well design way, we can reuse the 3
channels non stop, without generating interference
66

66
11
11

11

11
11
11

66
11
11
2009 Cisco Systems, Inc. All rights reserved.

66
11
66

11
11

11
11

IEEE 802.11b/g Compatibility


To be able to achieve b/g compatibility, a protection mechanism is
implemented, which permits the existence of both standars
clients in the same cell, associated to a given 802.11g AP:
If a 802.11g AP has a 802.11b associated, it activates the
protection mechanisms.
The protection mechanism is deactivated when the AP has 30
seconds without any 802.11b client associated.
802.11g is the extension of 802.11b and has been designed to
keep compatibility.

AP
802.11g
Cliente 802.11 b
Cliente 802.11 g

2009 Cisco Systems, Inc. All rights reserved.

Other IEEE 802.11 standards


Other specifications to consider when analyzing the WLAN
behavior:
IEEE 802.11
Is the original standard, that establishes the frame formats.
IEEE 802.11d
Allows the developing of global usage.
IEEE 802.1e
Supports applications with QoS requirements.
Is important for the deployment of voice, video,etc. Over WLAN links.
IEEE 802.11f
Communications protocol to keep the communication between APs.
Facilitates the roaming functionalities.
IEEE 802.11i
Enhanced specifications, in terms of security, encryption and
authentication.
2009 Cisco Systems, Inc. All rights reserved.

QoS in WiFi networks


IEEE 802.1e defines a standard for the application of QoS over
the air interface:
Allows the priorization of traffic when going from AP to client and vice
versa.
Is an important tool to deploy multimedia traffic over wireless networks.
Defines 8 possible classes. Maps with the 8 classes allowed by IEEE
802.11p in wired networks.
There are 2 versions nowadays:
WMM (Wireless MultiMedia)
created by the WiFi alliance before the approval of the standard.
Permits the definition of up to 4 classes.
IEEE 802.11e
the IEEE standard.
Defines up to 8 classes.
2009 Cisco Systems, Inc. All rights reserved.

Security in IEEE 802.11 Networks

2009 Cisco Systems, Inc. All rights reserved.

The need for security


Among the specifications of WLAN networks, we face the need for
security.
By using radio frequencies to transmit the information, we try to
cover the geography of the network, to provide service to any
client inside the coverage area.
Any intruder station inside the coverate area can have access to
the network or receive the information transmitted between clients
and access points.

2009 Cisco Systems, Inc. All rights reserved.

Basic elements
2 basic resources provided in the standard:
SSID.
To start the association process, and being able to have netowrk
access, client and APs should use the same SSID.
We can eliminate the broadcasting of the SSID by the AP.
MAC address authentication.
The standard considers that the AP, when going through the
authentication process, filters clients based on their MAC address,
permitting or denying specific MAC addresses.
Even though those are valid resources, they are not enough to
respond to security requirements today.

2009 Cisco Systems, Inc. All rights reserved.

Security elements
In order to provide minimum levesls of security, there is the need
for 2 additional components:
Authentication.
Mechanism that defines who has access to what resources in the
network.
Encryption.
Technique used to provide privacy to the information transmitted,
so that only authorized end points will be able to have access to
the information.
In the case of wireless networks, the authentication without
encryption leaves the information totally exposed.

2009 Cisco Systems, Inc. All rights reserved.

802.11 Authentication
IEEE 802.11 provides 2 mechamisms for authenticating WLAN clients:
Open Authentication.
Shared Key Authentication.
Authentication is one of the phases of the integration of a client into a
WLAN cell:

1. Connection request
2. Beacon
3. Authentication Request
4. Authentication Acceptance
5. Association Request
6. Association Acceptance
7. Data Transfer

2009 Cisco Systems, Inc. All rights reserved.

WEP
Wired Equivalent Privacy.
Security mechanism originally provided with IEEE 802.11,
Uses 64 bits (40 bits for the Key + 24 bits for VI) or 128 bits (104
bits for the key + 24 bits for VI).
Keys are configured statically in the client and in the access
point.
Designed for initial applications, and is ideal for devices with
lower processing capacities:
Very simple to deploy.
Low overhead.

2009 Cisco Systems, Inc. All rights reserved.

Security Schemes

Standard

WEP

Key
Distribution

Device
Authentication?

Users
Authentication?

Encryption

Yes (weak)

No

Yes (weak)

PSK: Static

Yes

Pre-Shared-Key

TKIP

Ent.: Dynamic

Yes

802.1x

TKIP

PSK: Static

Yes

Pre-Shared-Key

AES

Ent.: Dynamic

Yes

802.1x

AES

Static

WPA

WPA2
IEEE 802.11i

2009 Cisco Systems, Inc. All rights reserved.

Security Schemes
IEEE 802.11 includes its own security scheme or framework:
Encryption to provide privacy to the communication:
WEP.
Authentication to control access to network resources.
Open authentication.
Authentication via pre-shared keys.
Extended security for IEEE 802.11 networks.
WPA.
WPA2 IEEE 802.11i.

2009 Cisco Systems, Inc. All rights reserved.

Considerations: WEP
Easy to implement and does not require high levels of
processing.
Does not scale well.
The cyphering mechanism has been violated.
Particularly weak when implementing both encryption and
authentication.
Not recommended for enterprise environments.
Usable in environments that do not require robust privacy,
when there is a need to limit access to the network.
Use it with open authentication.
Implement 128 bits keys.
Combine it with other resources, as not
broadcasting the SSID.
2009 Cisco Systems, Inc. All rights reserved.

Considerations: WPA
Is not an standard, but a model proposed by the WiFi
alliance.
Easy to implement and does not require high processing.
Scalable.
Has a relatively robust encryption mechanism (RC4).
Two ways to deplyo:
Enterprise: with IEEE 802.1x authentication.
SOHO: with PSK authentication.
Provides a robust security scheme.
Usable in deployments with medium security needs.

2009 Cisco Systems, Inc. All rights reserved.

Considerations: WPA2

Standard known as IEEE 802.1i.


Easy to implement but requires processing.
Scalable.
Has a robust encryption mechanism (AES) that requires
additional processing.
2 ways to deploy:
Enterprise: with IEEE 802.1x authentication.
SOHO: with PSK authentication.
Provides a solid robust security scheme.
Usable in deployments with a high and robust need for
security.

2009 Cisco Systems, Inc. All rights reserved.

SOHO / Enterprise
WPA and WPA2 provide 2 ways to deploy:
Enterprise.
Deploys user authentication by the use of 802.1x.
Requires the implementation of a RADIUS server on
the network.
Highly scalable and provides very robust encryption.
SOHO.
Facilitates the implementation in reduced
environments, without the need for a RADIUS server.
Uses Pre Shared Keys.
Is less robust.

2009 Cisco Systems, Inc. All rights reserved.

Wireless Product Families and their


Architecture

2009 Cisco Systems, Inc. All rights reserved.

Versatile and Complete Porftolio


IEEE 802.11b/g

IEEE 802.11n

Outdoor

WAP200E

Indoor

WAP200

2009 Cisco Systems, Inc. All rights reserved.

WET200

WAP2000

WAP4400N

WAP4410N

Feature comparison
Product

WAP200

WAP200E

WET200

WAP2000

WAP4400N

WAP4410N

Speed

10/100

10/100

10/100

10/100

10/100/1000

10/100/1000

Type

802.11g

802.11g

802.11g

802.11g

802.11g/n

802.11g/n

POE

Yes

Yes

Yes

Yes

Yes

Yes

Multiple BSSIDs

No

Multiple SSIDs

No

# Ports

802.1q

Yes

Yes

Yes

Yes

No

No

Removable Antennas

Yes

R N-Type

Yes

Yes

Yes

Yes

AP/Client
(Wireless Security
Monitor)

Yes

Yes

Yes

Yes

Yes

Yes

AP,
Repeater,
Bridge

AP,
Repeater,
Bridge

Bridge

AP,
Repeater,
Bridge

AP Only

AP,
Repeater,
Bridge

Yes

Yes

Yes

Yes

Yes

Yes

Multiple Modes

VLAN
Automatic Channel
Selection

2009 Cisco Systems, Inc. All rights reserved.

Features: Power
Cisco Small Business solutions are ideal for small and medium
customers.
They are designed specifically for SB customers and offer
advanced features, typically found on enterprise solutions, such as:
PoE.
Power can be provided from a LAN PoE switch port.
Allows the installation of APs flexibly, on optimal locations
U-APSD.
Optimizes the use of power coming from Wi-Fi phones
batteries.

2009 Cisco Systems, Inc. All rights reserved.

Features: Performance
Roaming 802.11f.
Standard roaming feature for several manufacturers. Offers mobility for
wireless clients.
Automatic radio frequency channel selection.
Selects the optimal channel for the best performance.
Rangebooster 1x2.
increases (deploying MIMO) up to 2 times the coverage range for cells in
802.11g networks.
Wireless n - 2x3 in WAP4400N and WAP 4410N.
Increases the range on 802.11g networks, up to 4 times, and the
throughput up to 9 times.
SNMP.
Allows management form a SNMP manager station.
Gigabit Interface on WAP4400N and WAP4410N.
High performance.
2009 Cisco Systems, Inc. All rights reserved.

Features: Security
Multiple SSIDs (4).
Each SSID creates a wireless network or different VLAN, making
it possible to separate the traffic on the air.
Multiple BSSIDs (4).
Advertises multiple SSIDs.
VLANs 802.1Q.
Multiple VLANs allow the separation of traffic that was separated
in the air via SSIDs, now on the LAN network.
WPA/WPA2 Enterprise.
Secure authentication, centralized, implementing RADIUS
servers.
New client detection or New AP detection - Wireless Security
Monitor.

Informs the administrator when a new client or a new access


point has being introduced into the coverage area.
2009 Cisco Systems, Inc. All rights reserved.

Features: QoS

WMM to 802.1p QoS


Permit the mapping of traffic marking for QoS in wireless
networks (WMM) to the traffic marking used in wired networks
(802.1p).
Keeps consistency of the QoS deployment, specially on networks
that transport Voice and/or video for wireless clients.

2009 Cisco Systems, Inc. All rights reserved.

Wireless Clients

WPC200
WUSB200

WMP200
WPC4400N
2009 Cisco Systems, Inc. All rights reserved.

Wireless Client Comparison


Product

WPC200

WMP200

WUSB200

WPC4400N

Type

802.11g

802.11g

802.11g

802.11g/n

MIMO

1x2

1x2

1x2

2x3

Wireless support

Yes

Yes

Yes

Yes

802.1x

Yes

Yes

Yes

Yes

WEP

Yes

Yes

Yes

Yes

WPA

Yes

Yes

Yes

Yes

WPA2

Yes

Yes

Yes

Yes

2009 Cisco Systems, Inc. All rights reserved.

WAP2000 Business Wireless-G AP


with Rangebooster 1x2
Low cost solution, enhanced features, for environments
sensitive to pricing.
Metalic casing
Dual firmware images.
Removable antennas.
3dbi antenna (vs 2dbi with WAP200)
Kensington Security Lock for physical security.

2009 Cisco Systems, Inc. All rights reserved.

WAP2000 Business Wireless-G AP


with Rangebooster 1x2
Features:
VLANs: 4.
Up to 45 users associated.
Advanced QoS : 802.1p and WMM.
PoE or external power supply.
WPA2, WPA Enterprise, WPA PSK.
Advanced Wireless features:
Roaming 802.11f .
SSIDs: 4.
Automatic channel radio frequency selection.
MIMO 1x2 (Rangebooster).

2009 Cisco Systems, Inc. All rights reserved.

WAP4400N and WAP4410N


Main features
Wireless-N performance
Extended range and coverage, when compared to b/g
2x3 MIMO.
Up to 4 times the range, when compared to 802.11b.
Up to 9 times the transmission rate, when compared to
802.11g.
Reduces dead spots.
Compatible with 802.11b/g.
Wireless Protected Access (WPA/WPA2).
SOHO and Enterprise.
2009 Cisco Systems, Inc. All rights reserved.

802.11n / 802.11g
Range and Speed comparison

IEEE 802.11n

2009 Cisco Systems, Inc. All rights reserved.

IEEE 802.11g

Outdoor Access Point WAP200E


Main features:
PoE
The AP can be powered via a PoE switch.
1x2 MIMO.
Guarantees better coverage and range.
QoS (WMM, 802.1p), VLANs, WPA2, 802.1x.
Multiple BSSIDs, roaming and automatic channel selection.
Casing NEMA IP53 for outdoors installation.

Can be used with HGA9N.


Optional external antenna.
Omni-Directional antenna, 9 dBi.
Increases the range in a radius of 360 degrees.

2009 Cisco Systems, Inc. All rights reserved.

Access Point Modes


Cisco Small Business access points can operate in several
modes:
Access Point.
Wireless Distribution System.
Bridging.
Repeater.
Infraestructure.

2009 Cisco Systems, Inc. All rights reserved.

Access Point Mode


Is the most common mode of operation.
Allows the access of wireless clients to the
wired network.
When there are multiple SSIDs, the wireless
network is virtualized, so that the Access
Point operates as multiple APs
When there are multiple AP on a LAN
Networks:
Roaming can be implemented using IAPP
(standard).
To facilitate the RF operation, enable the
automatic channel selection.

Wireless Security Monitor: detects new APs


and clients on the wireless network.
ROAMING

2009 Cisco Systems, Inc. All rights reserved.

WDS (Wireless Distribution System)


Repeater Mode

Supported in WAP 200/2000, WAP


200E and WAP 4410.
Allows the extension of the coverage
area.
Over the coverage area, up to 4
SSIDs can be deployed.
By operating in this mode, all of the
APs operate in the same channel,
therefore reducing the throughput in
50% for each hop.
Disadvantage: only can be used
products with the same chipsets.

2009 Cisco Systems, Inc. All rights reserved.

Access Point
Mode

Repeater
Mode

WDS (Wireless Distribution System)


Repeater Mode

Each AP can link together up to 3 APs in bridge or repeater mode.


The throughput is reduced to 50% in each hop.
Maximum supported: 3 levels.
Maximum infrastructure: 13 repeaters.

2009 Cisco Systems, Inc. All rights reserved.

WDS (Wireless Distribution System)


Bridging Mode

Supported in WAP 200/2000, WAP


200E and WAP 4410.
Enables the connection of wired
network segments at the layer 2 level,
in the same or different buildings.
Over the wireless link, only 1 SSID
can be implemented.

Bridge mode

In this mode, all of the APs operate in


the same channel.
Disadvantage: by operating in bridge
mode, the device cannot associate
end clients with wireless cards.

2009 Cisco Systems, Inc. All rights reserved.

Bridge mode

Bridges vs. APs


Bridge:
Enables the mirroring of network ports for fault detection.
VLANS based on ports or 802.1Q VLANS only for local access.
Only 1 wireless VLAN.
Spanning Tree Protocol Support.
Does not support wireless clients.
Bridges an Ethernet network to any AP, including Cisco Aironet
APs.
Provides a link between wired and wireless networks.
Access Points:
Support for multiple SSIDs and BSSIDs.
Wireless clients associate with an AP.

2009 Cisco Systems, Inc. All rights reserved.

Wireless Bridge WET200


Wireless Bridge with a 5 ports switch integrated.
Only one in the market that integrates a 5 ports switch.
Main features:
PoE
The bridge could be powered via a PoE switch.
1x2 MIMO
Guarantees better coverage and range.
QoS (WMM, 802.1p), VLANs, 802.1x, WPA2 Security.
Removable antennas.

2009 Cisco Systems, Inc. All rights reserved.

WET200 in Ad-Hoc mode

Point to Multipoint Bridging Scenario


Offers Bridging Point to
Multipoint in Ad-Hoc mode.
In this scenario, 3 LANs are
connected using 3 bridges
WET200.
WET200 can be powered via a
DC adapter or a PoE switch.

2009 Cisco Systems, Inc. All rights reserved.

WET200 in Infrastructure Mode


In infrastructure mode,
WET200 can get connected as
a client to any access point,
including other vendors.
Enable the connection of wired
devices to the wireless network
(for example, printers).
Provides flexibility for SB
customers.

2009 Cisco Systems, Inc. All rights reserved.

Typical Deployment Scenarios

2009 Cisco Systems, Inc. All rights reserved.

Scenario 1:

Wireless connectivity at the office


ABC is a coffee shop that wants to
provide wireless Internet access to their
customers. They now offer the service,
via the wired network, but they want to
include the wireless flexibility. For this
reason, they want to include a minimum
level of security, to make sure only their
customers have access to Internet.
Your company has been hired to provide
a solution in which ABC customers can
share the Internet access without the
need for special network cards or
additional software. Make sure, using
passwords, that only legitimate
customers have access to ABCs
Internet connection.

2009 Cisco Systems, Inc. All rights reserved.

Scenario 2:

Securing the Wireless Environment


Languages Inc is a languages school.
Currently they provide free Internet
access for students, but now they want
to migrate their employees to the
wireless network too. They are
concerned by having both employees
and customers over the same wireless
infrastructure.
Your company has been hired to provide
a network solution in which you
demonstrate Languages Inc. The
different ways of implementing security,
and help them make the right choice for
their scenario.

2009 Cisco Systems, Inc. All rights reserved.

Scenario 3:

Expanding the Wireless Network


XYZLaws Inc. Is a lawyers firm
which has a wireless network, and
have now acquired the office space
next door. As a result, they now
have coverage holes they need to
cover.
XYZ has called you to design a
wireless solution that complements
whta they already have, and
completes the coverage area for
the new office space.

2009 Cisco Systems, Inc. All rights reserved.

Scenario 4:

Expanding the wireless network, outdoors


XYZ Inc. now has acquired
a new office building on the
other side of the street.
They want to connect the
new building with the
existing network.
XYZ has called you to
design a wireless network
solution that complements
what they already have,
and completes the new
needed coverage area.

2009 Cisco Systems, Inc. All rights reserved.

Deployment Scenarios

2009 Cisco Systems, Inc. All rights reserved.

Our Scenario
The lawyers firm ABCLaw, our customer, wants to implement a
wireless network in which personnel at the office can use, without
the need for cables. considerations:

Access only to employees of the lawyers firm.

Information sent over the wireless network will not be


sensitive.

There is a concern regarding other people working in offices


in the same building, that could make use of the Internet
access from ABCLaw.

2009 Cisco Systems, Inc. All rights reserved.

Initial Proposal

VLAN20: WLAN

Take this VLAN to the router, via


trunks.

Incorporate a new DHCP pool on


the router for the new VLAN:

F0/0

Create a new VLAN for the


wireless network.
Receptionist
E24
Receptions
server

Auxiliaries
G1

G2

G1

G2

VLAN20: 172.16.20.0/24

Connect an access point to an


access port belonging to VLAN
20.
Enable the SSID in the access
point:

Office

Without SSID broadcasting.

Open authentication and


encryption: WEP 128.

2009 Cisco Systems, Inc. All rights reserved.

Lawyers

Lawyers
Server

Auxiliaries

Auxiliary
Server
Office

Initial proposal
Solutions:

The access point allows the wireless access to the network


resources.

Access to other VLANs can be filtered at the router.

Not broadcasting the SSID and including WEP, we are limiting


the possibilities for people connecting from outside the office.

Limitations

All the computers at the office will be on the same VLAN.

As we are not broadcasting the SSID, it is needed to configure


manually every computer to have access to the wireless
network.

WEP is not a robust encryption service.

2009 Cisco Systems, Inc. All rights reserved.

Relevant Concepts:
Broadcasting the SSID.

Is the default option

Eliminating the SSID broadcasting, the AP stops advertising


that SSID in each beacon.

In order for a computer to be able to have wireless access, it is


necessary to configure it manually to add the SSID.

WEP

Weak encryption protocol.

Can operate with 64 or 128 bits keys.

Additionally, you can configure up to 4 different keys.

Does not scale well in networks with multiple APs.

2009 Cisco Systems, Inc. All rights reserved.

Initial proposal - Lab

At this point, it is recommended to use the lab equipment


available on the classroom to configure the proposed solution.

Using the Lab guide, do exercises:

0 Preparing the lab equipment, page 2.

1 initial deployment, page 4.

2 SSID with WEP128, page. 8.

2009 Cisco Systems, Inc. All rights reserved.

Enhanced proposal 1

Create a new SSID to separate


traffic coming from lawyers and
their secretaries.

SSID: lawyers.

VLAN21: 172.16.21.0/24

Without broadcasting the


SSID.

Security: WPA2-PSK.

Create a new VLAN for this


SSID at the switches.

Associate the access port where


the AP is connected to the new
VLAN.

Take the VLAN to the router, via


trunks.

Incorporate a new DHCP pool at


the router, for the new VLAN:

VLAN21: 172.16.21.0/24

2009 Cisco Systems, Inc. All rights reserved.

F0/0

E24

G1

G2

G1

G2

Lawyers

Office

Initial Proposal
Solutions:

Does not require the installation of a new AP.

It acts virtually as a totally independent network.

Separates the traffic coming from lawyers and their secretaries


from the traffic of the rest of the office.

Deploys a robust security framework.

Limitations:

The network configuration is every time more complex.

By not broadcasting the SSID, it is necessary to manually


configure the wireless network in each laptop.

Deploying WAP-PSK requires a careful configuration of the


wireless client on the end users that will connect to that SSID.

2009 Cisco Systems, Inc. All rights reserved.

Relevant Concepts:
WAP2-PSK.

Deploys authentication with pre-configured fixed key.

Activates encryption with 128 bits AES-CCM over the air


interface.

Activates integrity control, as a function of hashing algorithms,


making sure frames are not modified during their transit
through the air.

This is a robust security scheme.

2009 Cisco Systems, Inc. All rights reserved.

Enhanced proposal 1 - Lab

At this point it is recommended to use the lab devices available


to deploy the proposed solution.

Using the Lab Guide, do exercises:

3 SSID with WPA2-PSK, page. 13.

2009 Cisco Systems, Inc. All rights reserved.

Enhanced proposal 2

Create a new SSID to separate


traffic from visitors.

SSID: Visitors.

VLAN22: 172.16.22.0/24

With SSID broadcasting.

Encryption WEP-64.
E24

Create the new VLAN for this


SSID in the switches.

Associate the access port


where the AP is connected, to
the new VLAN.

Take the VLAN through the


router, via the trunks.

F0/0

G1

G2

G1

G2

Lawyers
server

Lawyers

Incorporate a new DHCP pool


in the router for the new VLAN:

VLAN22: 172.16.22.0/24
Office

2009 Cisco Systems, Inc. All rights reserved.

Visitors

Initial proposal
Solutions:

Does not require the installation of a new AP.

Allows the creation of a SSID that will be discovered by


visitors at their WLAN clients.

Traffic from visitors will remain separate from the rest of the
office.

WEP encryption makes sure that only those with the correct
key have access to the network.

Limitations:

The network configurations complexity increases.

The deployment of WEP requires the configuration of the Key


in every client that wants to have access to the network.

2009 Cisco Systems, Inc. All rights reserved.

Relevant Concepts:
WEP encryption.

The proposal includes WEP encryption but non authentication.

As it does not require any authentication, clients are


associated to the AP without any requirement.

But by non authenticating the WEP key, the systems is more


robust.

As it user encryption, if the client does not have the correct


key, it wont be able to pass traffic over the network. Not even
DHCP requests.

2009 Cisco Systems, Inc. All rights reserved.

Enhanced proposal 2 - Lab

At this point, use the lab equipment available to deploy the


solution proposed up to this point.

Using the Lab Guide, do exercises:

4 SSID with WPA2-PSK, page. 13.

2009 Cisco Systems, Inc. All rights reserved.

Tools and Resources

2009 Cisco Systems, Inc. All rights reserved.

Marketing Resources for Partners


Partner Marketing Guide plus welcome kit for Campaign Builder
to download online click here
http://www.cisco.com/web/partners/downloads/partner/sell/enablement/EM_interactive_marketing_guide/index.html
Channel Syndication Program- Webcollage
Cisco SB product information, automatically updated on the partners website
www.cisco.com/go/webcollage
Campaign Builder- Marketing online tool
allows partners to create joint marketing campaigns at no charge www.cisco.com/go/campaignbuilder

Marketing Library Cisco product images


www.cisco.com/go/vam
Cisco Partner Space Virtual collaboration environment. www.ciscopartnerspace.com
Public relations templates for Partners
Access to press releasess templates
http://www.cisco.com/web/partners/market/public-relations.html
Cisco Quote Builder
www.cisco.com/go/quotebuilder

2009 Cisco Systems, Inc. All rights reserved.

Summary
The main aspects covered in this sessions were:
The business requirements and objectives of a SB customer.
The main components and functions of a wireless network
Products and solutions to create wireless connectivity for SB
customers
The main hardware components of the Cisco Small Business
producto families
Typical scenarios in the day-to-day operations.

2009 Cisco Systems, Inc. All rights reserved.

2009 Cisco Systems, Inc. All rights reserved.

Vous aimerez peut-être aussi