Wi-fi Security Protocols and Authentication Methods
Welcome to the Wi-Fi Security Protocols and Authentication Methods Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Introduction
Welcome to the Wi-Fi Security Protocols and Authentication Methods Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 - Configure Authentication
- Exercise 2 - Change the Default Password
- Exercise 3 - Configure Static IP Address on the Wireless Router
- Exercise 4 - Configure Web Utility Access
- Exercise 5 - Enable MAC Filtering
After completing this lab, you will be able to:
- Configure Single-factor Authentication
- Learn About Multifactor Authentication
- Configure RADIUS-based Authentication
- Learn About TACACS
- Change the Default Password
- Configure Static IP Address on the Wireless Router
- Configure Web Utility Access
- Perform MAC Address Filtering
Exam Objectives
The following exam objectives is covered in this lab:
- 220-1002: 2.2 Compare and contrast wireless security protocols and authentication methods
Lab Duration
It will take approximately 45 minutes to complete this lab.
Exercise 1 - Configure Authentication
Authentication is the process of validating a user. A user would enter their credentials and, if accurate, their credentials are accepted, and access is granted to them. The authentication mechanism could be based on single or multiple factors. Based on the sensitivity of the data or system, the type of authentication mechanism is determined. For authentication purposes, one of the following factors is generally used:
- Character string
- Fingerprint
- Retina
In this exercise, you will learn about different types of authentication.
Learning Outcomes
After completing this exercise, you will be able to:
- Configure Single-factor Authentication
- Learn About Multifactor Authentication
- Configure RADIUS-based Authentication
- Learn About TACACS
Exercise 2 - Change the Default Password
Wi-Fi devices come with a set default password. This password is used for accessing the router’s functionality. Usually, the default password for all the routers made by the same manufacturer is the same and is available in the public domain. Therefore, it is necessary from the security point of view to change the default password. To change the default username and password, perform the following steps:
Learning Outcomes
After completing this exercise, you will be able to:
- Change the default password
Exercise 3 - Configure Static IP Address on the Wireless Router
Each device connected to a network or the Internet has an IP address assigned to it. The IP addresses that are used within a network used the private network IP address ranges, which are as follow:
- 10.x.x.x
- 172.16.x.x to 172.31.x.x
- 192.168.x.x
The private network IP address ranges are considered to be non-routable and cannot be used on the Internet. For an IP address to be used on the Internet, it needs to be a public IP address. For example, 8.8.8.8 is a public IP address.
In this exercise, you will learn to configure a static IP address on the wireless router.
Learning Outcomes
After completing this exercise, you will be able to:
- Configure Static IP Address on the Wireless Router
Exercise 4 - Configure Web Utility Access
A wireless router can be accessed using two methods: by connecting an Ethernet cable and establishing a physical connection or establishing a remote connection through a Web browser. By default, first-time configuration is using the Ethernet cable because you need to enable certain parameters so that you can remotely connect. Later, most management is performed through a Web browser.
In this exercise, you will learn to configure the Web Utility Access.
Learning Outcomes
After completing this exercise, you will be able to:
- Configure Web Utility Access
Exercise 5 - Enable MAC Filtering
Each machine has a MAC address. A MAC address is the device’s globally unique hardware number. Unlike the IP address, the MAC address does not change. Hence, blocking a MAC address is the correct way of ensuring that the device is unable to access the network. This process is called MAC address filtering. A list of addresses that are to be blocked is maintained, and it is known as a blacklist. When a machine tries to access the network, its MAC address is checked against this list. If a match is found, the device is not allowed to access the network. Another method is to maintain the list of addresses to whom access is to be granted. In this method, it is made sure that the device’s MAC address is present in the list and then the network access is granted. To enable MAC address filtering, perform the following steps:
Learning Outcomes
After completing this exercise, you will be able to:
- Perform MAC Address Filtering
See the full benefits of our immersive learning experience with interactive courses and guided career paths.