It is day one of the month, hence the best time to plan my study hours. Here is the study plan for July. You can watch my progress as the days go by.
The Red days indicates days when I did not study at all. Let’s face it, we are all human and we have a tendency of being lazy 🙂. Yellow is for days when I did actually study but did not meet the planned number of hours. Finally,Green symbolizes the days when I actually studied the planned number of hours. Dark green (which is no where right now), will indicate the days when I did more than was expected of me.
We are half way through the year but It feels like the year has just begun. The plans remain unaccomplished, the dreams get bigger by the day but reality is a sad little story :). When I think that am a tad wiser, I get slapped back and realize that am actually stupidier than I thought I was initially. But then again, there is still hope. We are only half way through the year. Giving up is definitely not an option. Head held high. Eyes on the price. It’s time for my mid-year revolution.
If you are studying for CCNP Wireless or CWNP Certification, an essential part of the study process is actually getting to lab it all out so as to understand the concepts. I noticed that my Wireshark output lacked the 802.11 management or control packets while trying to capture Open System Authentication process. This blog will explain how to set up Wireshark for WLAN Capturing so that you do not miss the vital packet exchanges.
Read the rest of this entry »
This study plan was inspired by Rasika. Check out his blog. Very informative.
The Red days indicates days when I did not study at all. Let’s face it, we are all human and we have a tendency of being lazy :). Yellow is for days when I did actually study but did not meet the planned number of hours. Finally, Green symbolizes the days when I actually studied the planned number of hours. Dark green (which is no where right now), will indicate the days when I did more than was expected of me. Will that day ever come :(?? Sigh Read the rest of this entry »
When I think of the CWNP Program, I think of actual Wireless knowledge that Vendor oriented programs have failed to deliver. I have always used CWNP books to complement information that was missing during my past CCNP Wireless exams (2 more to go). It was therefore only logical that I would turn to their CWSP book to help me prepare for the next exam – 642-737 IAUWS.
Luckily, the new CWSP-205 study guide had just been published so I figured I would order it. Got the book yesterday and I have to say, am a tad disappointed. I have not read the book. I simply skimmed through it to see what is included and to be honest, I cannot help but compare it with the previous CWSP book published by Sybex. Read the rest of this entry »
Legacy authentication methods were more of an authentication of capability (verification between two devices that they were valid 802.11 devices) and not so much an authentication of user identity.
They are of two types: Read the rest of this entry »
Components of a Secure Network
Required components when securing a network are:
Data Privacy and Integrity
Access to Wireless medium is unrestricted hence the use of cipher encryption technologies is needed for proper data privacy.
A cipher is an algorithm that is used to perform encryption:
- RC4 algorithm ( Ron’s Code / Rivest Cipher)
- It encrypts data in a continuous stream (streaming cipher)
- Used in technologies used to protect Internet traffic eg SSL (Secure Socket Layer)
- Incorporated into 2 legacy encryption methods: WEP and TKIP
- Advanced Encryption Standard Algorithm (AES) / Rijndael Algorithm
- Encrypts data in fixed blocks
- Much stronger than RC4
- Uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption method
- Encryption key strength options are 128, 192 or 256 bits.