Show Menu
Cheatography

Network+ | 10. Wireless Networks Cheat Sheet by

CompTIA Network+ certification course sum up. Oriented for cybersecurity later courses. *This sheet is quite simplified as its goal is to prepare for cybersecurity certifications. Some purely tech topics are missing.*

Wireless Network

WIFI standard
IEEE 802.11
 
AdHoc (p2p) or Infras­tru­cture mode (star topo)
WAP
Wireless Access Point
 
extend wired LAN into wireless domain, devices are in the same subnet, single collision domain.
Wireless Router
gateway device, routing capacity added.

Wireless Service Sets

IBSS
adHoc mod only, no AP, no internet
BSS
one single AP connected to network
ESS
Several AP to extend coverage
Mesh Topology
combin­ation of several types (WIFI, MW, cellular, etc)
AP Placement
Enough coverage but limit ovelapping
2.4GHz
10-15% overla­pping, but with diff. channels. Channels shall not overlap
5 GHz
2 cells separation minimum
Sites survey
heatmaps to dertemine coverage gaps
Range extender
wireless repeater

Antennas

Effect­iveness factors
distance, pattern, enviro­nment
Omnidi­rec­tional
radiates equally in all directions
Unidir­ect­ional
focus power in one direction, covers long distances (Yagi antenna)

802.11 standards

802.11b
2.4GHz
11Mbps
802.11g
"
56Mbps
802.11a
5GHz
56Mbps
802.11ac (WIFI5)
"
3Gbps (MU-MIMO)
802.11n (Wifi 4)
2.4 and 5GHz
150-600 Mbps (MIMO)
802.11ax (Wifi 6)
2.4, 5GHz & 6GHz
9.6Gbps (MU-MIMO)
 

Freque­ncies

DSSS
Spread spectrum modula­tion, reliable, inefficent use of bandwith
FHSS
Spread spectrum modula­tion, increased security, limited bandwith, latency & complexity (syncro)
OFDM
Multi carrier modulation (52 streams)
--------
------­---­---­---­---­---­---­---­-----
Channel
virtual medium to exchange data
2.4GHz
11-14 channels (US, World, Japan)
 
1, 6 & 11 non-ov­erl­apping channels
5GHz
24 non-ov­erl­apping channels, 20MHz size
Channel Bonding
wider channel created with merging neighb­oring channels
--------
------­---­---­---­---­---­---­---­-----
RFI
Interf­erences due to similar fq on several devices
CSMA/CA
Collision avoidance principle
 
Request to Send <> Clear to Send

Wireless Security

PSK
Pre-Shared Key = WIFI Key
WEP
802.11 original security standard
unsecure
Initia­liz­ation Vector (IV)
WPA
TKIP (IV+RC4)
replace WEP
MIC (integrity check)
WPA2
802.11i standard
strong
CCMP integrity check
 
AES encryption
Authen­tic­ation
Entreprise vs Personnal mode
 
creden­tials vs PSK
802.1x
network authen­tic­ation for each user
EAP
secured tunneling using 802.1x
MAC Filtering
listing of permitted MAC adresses
NAC
permission on devices' charac­ter­istics like OS or antivirus version
Captive Portals
web page with credential login or certif­icate
Geofencing
GPS or RFID real-world boundaries
Disable SSID broadcast
but can be detected with sniffing tools
Rogue AP
Malicious AP setup to capture packets
Wardriving
reconn­ais­sance looking for unsecured Wless NW
War chalking
symbols on a wall to notify AP charac.
       
 

Comments

No comments yet. Add yours below!

Add a Comment

Your Comment

Please enter your name.

    Please enter your email address

      Please enter your Comment.

          Related Cheat Sheets

          WLAN Controller Cheat Sheet

          More Cheat Sheets by Aelphi

          Network+ | 01.Basics Cheat Sheet
          Network+ | 02.OSI Model Cheat Sheet
          Network+ | 03.TCP/IP Model Cheat Sheet