Page 37 - eBook_Packet Tracer_computerNetworking
P. 37

Now,  configure  the  Laptop.  Repeat  the  same  step  from  4-6.
               7 7         (the laptop’s Physical Device View might be slightly different).                         01


                            You could see the same wireless beam from access point to

                           the laptop



                                                                                                                    02
                                              Don’t forget to turn off the laptop
                                             before installing and turn it on again
                                                         after installing.




                                                                                                                    03






                                            Now you have successfully setup a
                                                       wireless network                                             04









                                   But the wireless network is not                                                  05
                               secure. How can we make it a secure
                                               network??





                                                                                                                    06

                                       You want to make a secure network
                                       because you want to avoid Wireless
                                                         Attack!

                                                                                                                    07



                                   Some of the method we can use to avoid
                                   WLAN Attack are, Limit the access to the
                                    network, authentication, encryption and
                                                 traffic filtering.
                                                                                                                    08






                                        Let us use this method to secure our
                                                         network
                                                                                                                    09
                                                                                                   30
   32   33   34   35   36   37   38   39   40   41   42