Overview

Introduction

Welcome to the Wi-Fi Security Protocols and Authentication Methods Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 - Configure Authentication
  • Exercise 2 - Change the Default Password
  • Exercise 3 - Configure Static IP Address on the Wireless Router
  • Exercise 4 - Configure Web Utility Access
  • Exercise 5 - Enable MAC Filtering

After completing this lab, you will be able to:

  • Configure Single-factor Authentication
  • Learn About Multifactor Authentication
  • Configure RADIUS-based Authentication
  • Learn About TACACS
  • Change the Default Password
  • Configure Static IP Address on the Wireless Router
  • Configure Web Utility Access
  • Perform MAC Address Filtering

Exam Objectives

The following exam objectives is covered in this lab:

  • 220-1002: 2.2 Compare and contrast wireless security protocols and authentication methods

Lab Duration

It will take approximately 45 minutes to complete this lab.

Exercise 1 - Configure Authentication

Authentication is the process of validating a user. A user would enter their credentials and, if accurate, their credentials are accepted, and access is granted to them. The authentication mechanism could be based on single or multiple factors. Based on the sensitivity of the data or system, the type of authentication mechanism is determined. For authentication purposes, one of the following factors is generally used:

  • Character string
  • Fingerprint
  • Retina

In this exercise, you will learn about different types of authentication.

Learning Outcomes

After completing this exercise, you will be able to:

  • Configure Single-factor Authentication
  • Learn About Multifactor Authentication
  • Configure RADIUS-based Authentication
  • Learn About TACACS

Exercise 2 - Change the Default Password

Wi-Fi devices come with a set default password. This password is used for accessing the router’s functionality. Usually, the default password for all the routers made by the same manufacturer is the same and is available in the public domain. Therefore, it is necessary from the security point of view to change the default password. To change the default username and password, perform the following steps:

Learning Outcomes

After completing this exercise, you will be able to:

  • Change the default password

Exercise 3 - Configure Static IP Address on the Wireless Router

Each device connected to a network or the Internet has an IP address assigned to it. The IP addresses that are used within a network used the private network IP address ranges, which are as follow:

  • 10.x.x.x
  • 172.16.x.x to 172.31.x.x
  • 192.168.x.x

The private network IP address ranges are considered to be non-routable and cannot be used on the Internet. For an IP address to be used on the Internet, it needs to be a public IP address. For example, 8.8.8.8 is a public IP address.

In this exercise, you will learn to configure a static IP address on the wireless router.

Learning Outcomes

After completing this exercise, you will be able to:

  • Configure Static IP Address on the Wireless Router

Exercise 4 - Configure Web Utility Access

A wireless router can be accessed using two methods: by connecting an Ethernet cable and establishing a physical connection or establishing a remote connection through a Web browser. By default, first-time configuration is using the Ethernet cable because you need to enable certain parameters so that you can remotely connect. Later, most management is performed through a Web browser.

In this exercise, you will learn to configure the Web Utility Access.

Learning Outcomes

After completing this exercise, you will be able to:

  • Configure Web Utility Access

Exercise 5 - Enable MAC Filtering

Each machine has a MAC address. A MAC address is the device’s globally unique hardware number. Unlike the IP address, the MAC address does not change. Hence, blocking a MAC address is the correct way of ensuring that the device is unable to access the network. This process is called MAC address filtering. A list of addresses that are to be blocked is maintained, and it is known as a blacklist. When a machine tries to access the network, its MAC address is checked against this list. If a match is found, the device is not allowed to access the network. Another method is to maintain the list of addresses to whom access is to be granted. In this method, it is made sure that the device’s MAC address is present in the list and then the network access is granted. To enable MAC address filtering, perform the following steps:

Learning Outcomes

After completing this exercise, you will be able to:

  • Perform MAC Address Filtering

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.