0% found this document useful (0 votes)
187 views3 pages

PKT Radius PDF

This document provides instructions for setting up a wireless network in Packet Tracer using Linksys devices with WPA2 Enterprise authentication, a RADIUS server, and DHCP. Key steps include configuring the Linksys router and RADIUS server, adding user credentials to the RADIUS server, and setting the wireless security settings on the router and wireless clients to use WPA2 Enterprise with the RADIUS server for authentication. Connectivity is tested using a simple PDU tool to observe RADIUS authentication packets.

Uploaded by

Ivan Sorondo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views3 pages

PKT Radius PDF

This document provides instructions for setting up a wireless network in Packet Tracer using Linksys devices with WPA2 Enterprise authentication, a RADIUS server, and DHCP. Key steps include configuring the Linksys router and RADIUS server, adding user credentials to the RADIUS server, and setting the wireless security settings on the router and wireless clients to use WPA2 Enterprise with the RADIUS server for authentication. Connectivity is tested using a simple PDU tool to observe RADIUS authentication packets.

Uploaded by

Ivan Sorondo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Setting Up a Wireless Network

Configuring a Linksys access point


So far, we have configured wireless networks without additional features such as
encryption or DHCP. In this section, we'll use the Linksys devices available in Packet
Tracer and create a topology with all these features.

We will also add a server (RADIUS) to this topology and enable RADIUS
authentication. WPA2-PSK enterprise will be the mode of authentication we will
choose in the Linksys router (Wireless Router0). After building this topology, switch
the default module of the laptop (Laptop0) with a Linksys-WMP300N module. Open
the Linksys router, go to the GUI tab, navigate to the Wireless tab, and change the
SSID field. We'll be using Linksys for this demo, as shown in the following figure:

Open the server, navigate to the Config tab, select AAA, and configure RADIUS
authentication with four user credentials. Configuration will be as follows.

Network configuration will be as follows:

ClientName ClientIP ServerType Key


Linksys 192.168.0.1 Radius password

[ 90 ]

www.it-ebooks.info
Chapter 9

User setup will be as follows:

UserName Password
alice pwd
bob s3ret
john secr3t
user1 passwd

Configure a static IP for the server as 192.168.0.50. Next, under the GUI tab
of the Linksys router, navigate to Wireless | Wireless security and enter the
following settings:

Security Mode WPA2 Enterprise


Encryption AES
RADIUS Server 192.168.0.50
RADIUS Port 1645
Shared Secret password

Move on to the wireless end devices, go to the Config tab, select Wireless, and enter
the following settings:

• SSID: Linksys
• Authentication: WPA2
• User ID: john
• Password: secr3t

Make sure you use a different pair of credentials for each wireless end device. Once
this is configured, the end device will get an IP address and you'll see the wireless
link indicating a connection.

[ 91 ]

www.it-ebooks.info
Setting Up a Wireless Network

Now, we'll configure the laptop that has the Linksys module. Go to the Desktop tab,
open the PC Wireless utility, choose the Profiles tab, and click on New. Enter any
name here, you'll see a list with the SSID name shown, click on Advanced Setup and
a wizard will guide you through the process.

Use the simple PDU tool to test the connectivity. If you use the simulation mode
before a wireless connection is established between two devices, you will see the
RADIUS packet being sent to the server by the router.

Summary
This chapter introduced you to the wireless devices used in Packet Tracer. We also
configured a simple wireless topology without any authentication and used the
physical workspace to demonstrate the range of wireless devices. Finally, we mixed
technologies such as WPA2, RADIUS, and DHCP and created a topology that uses
Linksys devices.

In the next chapter, we'll see how to segment a network at Layer 2 by configuring
VLANs, and also see how to configure routing between VLANs.

[ 92 ]

www.it-ebooks.info

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy