CCIE Wireless · CCIEW Written

1.3 Plan and design wireless solutions requirements

1.3.a Translate customer requirements into services and design recommendations 1.3.b Identify ambiguity and/or information gaps 1.3.c Evaluate interoperability of proposed technologies against deployed IP network infrastructure & technologies This topic often comes down to common sense and experience. When you’re engaged by a business to either perform a site survey (next topic) or design a… Continue reading 1.3 Plan and design wireless solutions requirements

CCIE Wireless · CCIEW Written

CCIEW – 1.2 Describe IEEE 802.11 standards and protocols

Another not-so-taxing-one here! I wrote all of the amendments up in a nice list for the CWNA Chapters 5-7 review: Standards and Amendments 802.11b – HR-DSSS – 2.4 – 2.4835 GHz 1, 2, 5.5 and 11 rates. 802.11a – OFDM – 5GHz UNII Bands – 6, 12, 24 + 9, 18, 36, 48, 54. 802.11g… Continue reading CCIEW – 1.2 Describe IEEE 802.11 standards and protocols

CCIE Wireless · CCIEW Written

CCIEW – 1.1 Describe WLAN organizations and regulations

This one is a nice light starter and anyone who has taken a couple of wireless exams in the past decade should have heard of all of the following albeit it may not be memorised! My CWNA Chapter 1-4 review should have mentioned most of these but I clearly didn’t deem it necessary! Fortunately the CWSP… Continue reading CCIEW – 1.1 Describe WLAN organizations and regulations

802.1x/EAP · CWSP

CWSP Chapter 4 – Enterprise 802.11 Layer 2 Authentication Methods

This one will be fairly short and crosses over with notes I’ve already made on EAP Types for CCNP Wireless Security. AAA – Authentication, Authorisation and Accounting This concept provides a framework that many a security policy is written around. Authentication This covers initial access to a network through some as basic as a pre-shared key (PSK) up to… Continue reading CWSP Chapter 4 – Enterprise 802.11 Layer 2 Authentication Methods

CWSP · Security

CWSP – Chapter 2 – Legacy 802.11 Security

To understand today’s security methods we must first understand the original methods! Authentication This step occurs before association and is often confused with standard authentication using username/password combinations. You could probably compare it with plugging a wired device into a switch and switchport negotiation taking place. Open System Authentication Only pre-RSNA (Robust Secure Network Authentication) method used.… Continue reading CWSP – Chapter 2 – Legacy 802.11 Security