Tải bản đầy đủ (.pdf) (41 trang)

Installing, Troubleshooting, and Repairing Wireless Networks phần 9 ppsx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (777.69 KB, 41 trang )

Assembling RF Connectors
313
Type N—Reverse-Polarity Crimp-on Plug for RG-58 Size Cables
Appendix B
314
Type N—Reverse-Polarity Crimp-on Jack for RG-58 Size Cables
SMA Plugs and Jacks
SMA connectors are identified by their small (1/4-inch) diameter
male threading on jacks and 5/16-inch body nut on plugs. Pin styles
may be male or female on either end. SMA connectors are typically
used on small diameter RG-174/RG-316 cables for pigtails but may
be used for medium diameter RG-58/RG-142 cables for moderate
length cable runs.
Assembling RF Connectors
315
Appendix B
316
SMA—Reverse-Polarity Crimp-on Plug for RG-174/316 Size Cables
Assembling RF Connectors
317
SMA—Reverse-Polarity Crimp-on Jack for RG-174/316 Size Cables
TNC Plugs and Jacks
TNC connectors are identified by their medium-size (3/8-inch) diam-
eter male threading on jacks and 7/16- to 1/2-inch knurled body nut
on plugs. Pin styles may be male or female on either end. TNC con-
nectors are typically used on medium diameter RG-58/RG-142 cables
for moderate length cable runs and access point antennas.
Appendix B
318
Assembling RF Connectors
319


TNC—Crimp-on Plug for RG-58 Size Cables
Appendix B
320
TNC—Reverse-Polarity Crimp-on Plug for RG-58 Size Cables
Assembling RF Connectors
321
TNC—Reverse-Polarity Crimp-on Jack for RG-58 Size Cables
Appendix B
322
TNC—Reverse-Polarity Crimp-on Plug for RG-174/316 Size Cables
323
APPENDIX C
On the CD-ROM
Computers chips and most digital devices are nothing without
software to make them do something, or to tell us about them. The
CD-ROM in the back of the book contains some of the most popular
programs for building and peering into wireless networks.
The marketing target for most wireless LAN tools is obviously
enterprise deployments for Microsoft Windows clients and servers. I’m
including some similar tools for Macintosh, expecting they are as easy
for you to use. I’ve had a lot of fun with and learned a lot from each
and every one of them, and I think you will too. Read about them, pop
the CD in your drive, install them—preferably extracting and
installing them onto your hard drive first as they do create some tem-
porary and log files—and welcome to the world of wireless networking!
Resources for Windows
Aerosol—Aerosol Program
Aerosol is an easy to use Windows-based wireless network detection
program for use with WLAN adapters using the PRISM2 chipset such
as the ATMEL USB or WaveLAN wireless cards on Windows. Aerosol

requires a supported protocol driver to be installed. You can install
WinPcap from , or the Prism Test Utilities
from the main Aerosol page, />aerosol.html. WinPcap support has been tested with WinPcap_3_0_
a4.exe, prior versions are known to have issues. Aerosol like similar
WLAN detection products will reconfigure the card to do its job so you
cannot wireless network while using it. Please extract the file and
place it on your hard drive before running the Aerosol.exe program.
Copyright 2003 by The McGraw-Hill Companies, Inc. Click Here for Terms of Use.
AirMagnet—AirMagnet Demo
AirMagnet is one of a small number of products designed for the
guru of corporate WLAN implementations, providing so much infor-
mation about any and all access points and client adapters within
range of its own WLAN adapter you may be overwhelmed. A very
useful product for identifying rogue and misbehaving WLAN devices
nearby. There are two versions—laptop and Windows CE/PDA—the
laptop version is more capable as far as recording and reporting
what it finds. The Windows CE version allows you to get much of the
same information the laptop version does, with portability and a sig-
nal strength indication for direction finding so that you can move
about and locate specific WLAN devices. The demo versions of the
product on the CD-ROM, for both Windows and Windows CE are
canned, with display samples only, as the full product requires a spe-
cific Cisco WLAN card to run. These will not show real-time data,
but give you a good example of how feature-rich this product is.

Appendix C
324
AiroPeek—AiroPeek Packet Sniffer
For the true LAN techie packet sniffing is everything. AiroPeek
puts your WLAN adapter into listen-only mode, reveals what it sees,

and gives you a lot of filtering to narrow down what you’re looking
for. Chances are you’ll need to update your wireless adapter
firmware and drivers to get it to work. If you need to discover an
intruder or a new threat to your network, you may have to dig down
and look at streams of data packets to determine the cause.
/>On the CD-ROM
325
Funk—Funk Software Odyssey Server and Windows Client
Odyssey is an integrated package of the company’s Steel-Belted
RADIUS remote access authentication software with 802.1x
EAP-TLS security for Windows 2000. Odyssey provides a complete
access control and security solution for wireless LAN deployments.
This product is so easy to use I cannot imagine trying anything else
to deploy a secure, controlled WLAN solution. />Appendix C
326
ISS—Internet Security Scanner
Internet Security Systems’ Wireless Scanner provides automated
detection and security analyses of mobile networks by utilizing
802.11b to determine system vulnerabilities. Fortunately it didn’t
reveal any security holes in my network other than I broadcast my
SSID while I’m testing the WLAN.
On the CD-ROM
327
NetStumbler
NetStumbler is a universal tool to use for detecting wireless network
activity. It provides significant amounts of data about each wireless
access point you can receive. It will reveal the MAC address of active
wireless devices, channels used, signal strength, SSIDs or lack there-
of, as well as whether encryption is used at a particular access point.


Appendix C
328
Radio Mobile—Roger Coudé’s Radio Mobile
If you are planning numerous or complex wireless networks that
have to cover long distances or irregular terrain, you simply cannot
do without Radio Mobile. Radio Mobile uses standard geological sur-
vey maps containing terrain data to show you the signal strength of
a signal throughout a selected area. This is a freeware program pro-
viding features similar to very expensive commercial radio site plan-
ning and coverage software. You can plot point-to-point paths or
point-to-multipoint signal distributions and see the signal strength
available. For instructions and links to obtain map files visit the
Radio Mobile website: />On the CD-ROM
329
Tardis—Tardis 2000 and K9
I love Tardis. What else can I say. For years this program has been
keeping a variety of servers and workstations on-time and in-synch
with the National Institutes of Standards and Testing’s (NIST) atom-
ic clocks. You can select the time server you prefer to obtain time ref-
erences from, some public, some private, with many across the
world. Tardis acts as both a time-getting client and time server pro-
gram. For workstations needing to synchronize with a local server,
there is the small, less complex K9 program as well. Registering
Tardis costs $20 and K9 is a mere $6. />Appendix C
330
WiMetrics—WiSentry
WiSentry is a LAN-based product that identifies wireless devices
connected or trying to gain access to your wired LAN. Set alarms
for intrusions and rogue access points, and then sniff them out with
the Windows CE/PDA version. Not yet as feature rich as some intru-

sion detection products, it is not limited to using specific WLAN
adapters nor does it require that there be any wireless devices on
your LAN, as it will tell you if and when they appear.

On the CD-ROM
331
WLANExpert
I really wanted to love WLANExpert until I discovered it does not
run on Windows 2000 or XP. If you don’t mind running it on Win-
dows 98 or Me you’ll be fine, and you may want to so that you can
enjoy its features. It works with most Intersil Prism2-based WLAN
cards, covering LinkSys and similar products. Two of the best fea-
tures are built-in antenna testing and reporting on whether your
attached antenna is good or bad—most useful for external antenna
connections or detecting a broken internal antenna. It has a module
that lets you set the transmit power for your LAN card.
/>Appendix C
332
ZEDu—ZoneEdit Dynamic Update
ZoneEdit Dynamic Update is my tool of choice for updating my
ZoneEdit DNS services for a couple of the servers I maintain on my
residential DSL service. It is simple and effective—which is all you
need to do the job. After the 45-day evaluation period you can regis-
ter the product for $17.95 through the author’s Web site.

Resources for Macintosh
Macintosh\APScanner—APScanner for Mac
A tool for detecting the presence of nearby wireless LANs.
/>Macintosh\MACStumbler—MacStumbler
Another tool for detecting the presence of nearby wireless LANs.

/>Macintosh\ClassicStumbler—ClassicStumbler
/>On the CD-ROM
333
Linux Resources
Since the open-source environment is quite dynamic, I chose to not
include any of the source or binary files or installers on the CD. You
should visit the respective Web site for the program you are interest-
ed in to get the latest files for your configuration. After finally get-
ting wireless to work on my Linux system, thanks to files and help
from AbsoluteValue Systems and the wlan-ng’contributions, I had
the pleasure of trying AirSnort, NoCat, and Sputnik successfully and
found them to be all they said they were—effective and useful. If
you’re a Linux-junkie, dig in!!
AbsoluteValue Systems: />A must-visit site to obtain source code and relevant information to
build into your Linux system for wireless networking.
AirSnort: />AirSnort is the most popular tool for grabbing WEP encryption key
information from a wireless network. It may be of value as part of a
security analysis but it’s real purpose is to reveal the keys of other
people’s wireless LANs.
Kismet Packet Sniffer: />Kismet sniffs data packets present on a wireless network—valuable
stuff if you’re into low-level network and data security analysis.
NoCat Authentication: />NoCat appears to be the choice of gateway and access control pro-
grams for many open/community and closed/commercial wireless net-
work hotspots. It is the foundation for the Sputnik portal program.
SOHOWireless LANRoamer: />LANRoamer is another option for creating a wireless network
hotspot similar to the Sputnik project—download the CD-ROM
image file, burn a CD, put the CD in a system with a wireless card
and access to your network or the Internet. Instant wireless portal
site.
Appendix C

334
Sputnik: www.sputnik.com
Want to provide a community network? Get up and running fast
with this CD-ROM–bootable instant portal. The software forces
users of a Sputnik-backed access point to log in to the Sputnik.com
server. The service is free, and the web site maintains a list of affili-
ated community hotspots.
SSIDSniff: />SSIDSniff falls into the same category as WAVE Stumbler; it detects
and identifies other nearby wireless LANs.
Trustix Firewall:
Finally, a firewall for the rest of us who are not and do not want to be
proficient at IPChains and similar scripts to control what goes in and
out of our networks. Trustix Firewall is a secure Linux implementa-
tion designed to make any x86 system into a firewall appliance, with
a graphical interface for configuring it specifically as a firewall to go
between your LAN and the Internet or other connections. It also pro-
vides IPSec VPN services between two systems that have static IP
addresses. While there is no specific wireless component to this prod-
uct, it treats wireless connections as it would any other Ethernet
connection; it’s a good tool for any network.
WAVE Stumbler: />WAVE Stumbler allows you to detect and identify other wireless LANs
nearby. It is a good tool for doing site surveys, to see who is on which
channel, and (perhaps with a directional antenna) find other WLANs.
WEPCrack: />WEPCrack is designed to prove the ease of breaking the WEP key
encryption scheme. It does not sniff for packets; instead you must
acquire packets using the prismdump program to create a file of cap-
tured packets and then feed that file into WEPCrack.
wlan-ng pages: />A must-visit site to get source code and installable wireless network-
ing files for all that is installable for RedHat Linux and common
wireless devices.

On the CD-ROM
335
This page intentionally left blank.
337
GLOSSARY
802.11—A family of specifications developed by the Institute of Elec-
trical and Electronics Engineers, Inc. (IEEE) for wireless LAN tech-
nology. 802.11 specifies the radio signal interface between a client
radio and a base station radio, or between two client radios. There
are several specifications in the 802.11 family:

802.11—Wireless LANs providing 1 or 2 Mbps transmission in the
2.4 GHz band, using either frequency hopping spread spectrum
(FHSS) or direct sequence spread spectrum (DSSS).

802.11a—A subset of 802.11 that provides an up to 54 Mbps data
rate using the 5 GHz band. 802.11a uses an orthogonal frequency
division multiplexing encoding scheme, rather than FHSS or
DSSS.

802.11b—(Also known as Wi-Fi or wireless fidelity.) A subset of
802.11 that provides 11 Mbps data rates with the ability to scale
back to 5.5, 2, or 1 Mbps rates, and uses the 2.4 GHz band.
802.11b uses the DSSS modulation scheme. 802.11b allows Ether-
net functionality over radio.

802.11c—Relates to 802.11 bridging functions.

802.11f—An interaccess point protocol to help ensure interoper-
ability for roaming access.


802.11g—Provides 20+ Mbps in the 2.4 GHz band.

802.11h—A future standard for wireless spectrum management.

802.11i—A standard for enhancing the security of wireless local
area networks (WLANs). Preceded by an interim nonstandard Wi-Fi
protected access (WPA) security enhancement.

802.1x—A standard for wireless LAN authentication methods.
Copyright 2003 by The McGraw-Hill Companies, Inc. Click Here for Terms of Use.

×