Enterprise WLAN Troubleshooting: Methods, Tools, and Commands

Verified

Added on  2023/06/10

|19
|2152
|307
Practical Assignment
AI Summary
This assignment focuses on troubleshooting an enterprise Wireless Local Area Network (WLAN) by exploring different techniques such as the bottom-up, top-down, and divide-and-conquer approaches. It identifies tools and commands, particularly within the Windows command prompt (CMD), used for diagnosing and resolving network issues. The solution addresses common problems like access point failures, client connectivity issues, and guest network access restrictions, providing step-by-step instructions and screenshots for rectification. It also includes methods for diagnosing controller, access point, client problems, and guest access issues, offering practical solutions for network administrators. The assignment is designed to equip students with the knowledge and skills necessary for effective WLAN troubleshooting and maintenance.
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INSTITUTION:
FACULTY:
DEPARTMENT:
NAME:
REGISTRATION NUMBER:
COURSE TITLE:
COURSE CODE:
TUTOR:
Document Page
Table of contents:
1. Introduction……………………………………………………………………………………………1.0
1.1 components of WLAN………………………………………………………………………..1.1
2. Task 1………………………………………………………………………………………………………..2.0
2.1 setting up of enterprise WLAN……………………………………………………………..2.1
2.2 confirm WLAN exists……………………………………………………………………………..2.2
2.3 Bottom-up approach…………………………………………………………………………….2.3
2.4 Top-down technique………………………………………………………………………………..2.4
2.5 Divide & conquer…………………………………………………………………………………….2.5
3 Task 2……………………...............................................................................................3.0
3.1 Tool, command and methodology……………………………………………………………..3.1
Document Page
NETWORKING
1 Introduction.
Montemurro,2012. Found that Network administration is a comprehensive process ranging from basic
physical network set up and configuration to the complexed software based administration even to
programming in the administration. Software based are those that the admins use already made
software for administration, the common software used are the CISCO based such as the WLC, WLCM
and Aeronet but they are not open source, for learning purposes, simulation software such as fiddler
and wireshark are commonly used. Network administration also extends to programming where the
admin writes programs in the provided language commonly java and python to control the network
devices in a network and the most common one is the administration using one selected node as the
admin computer by use of the command prompt for windows and for linux series, they already have
terminal interface where the admin needs to type in commands for administration.
Generally, an enterprise WLAN is made up of three basic components;
Access point:
It is the primary part for any Wi-Fi client to connect to a wired network either internet or intranet. A Wi-
Fi client scans for SSIDs broadcasted from the Access point, chooses an SSID and then connects it to the
network via standard verification process. Access point literally is that point where the server router or
server machine is placed actually the Access Point or the AP is the device itself
Authentication server(AAA):
This avails verification service to Wi-Fi clients not only by the use of user ID or password as
conservatively undertaken, but likewise by the use of user data in SIM or USIM of the smart device.
provides a network service that applications use to validate the more often, normally account names
and passwords, of their users. When a client submits a valid set of credentials, it receives a
cryptographic ticket that it can successively be used to access various services.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Verification is used as the basis for approval, which is the resolve whether a honor may be given to a
certain user or process, confidentiality, which keeps information from becoming open to non-authorized
persons, and non-refutation, which is the inability to deny having done something that was permitted to
be done based on the verification.
Main authentication algorithms are passwords Kerberos, and pk-encryption.
Wireless Intrusion Prevention System(WIPS):
Luo,2014. Found that WIPS senses blush APs or unapproved Wi-Fi devices in a WLAN and foils them
from accessing or invading the network, WIPS sensors observing all the packets that traverse via all the
Wi-Fi frequency bands in real-time and placed through the network. WIPS likens the MAC address of all
wireless access points or the APs on a network against the known autographs of pre-authorized, known
wireless access points and notifies the network administrator when a inconsistency is found. To
circumvent MAC address tricking, other high-end WIPS are capable of analyzing the sole radio frequency
signatures that wireless devices generate and deny access to unknown radio fingerprints.
AP controller:
It is basically a supervision system that supervises all APs. It gathers information from distinct APs and
examines them ensuring and maintaining the service quality of the whole wireless network. WLAN AP
controllers functions as the switch for all the wireless traffic directing to a specific destination as
intended just as the normal switch.
Create the WLAN manually since there is no cmd command for the creation of the WLAN.
Apparently there is no working command prompt command that creates WLAN all that is available is the
netsh command which is only capable of managing or rather administering the network this therefore
suggests the use of manual way of creating the WLAN in the machine as the steps are prescribed below.
2 Task 1
2.1 Setting up the enterprise WLAN
Document Page
Document Page
2.2 Confirm the existence of the WLAN via CMD using the;
The enterprise WLAN created is called HCK hence if it exists it will show that name when the command
below is executed to show all the WLAN profiles.
netsh wlan show profile command.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Sure the WLAN HCK was created and it exists in the WLAN profile displayed from the above command.
Try connecting to the newly created WLAN access point in the cmd again.
2.3 Bottom-up approach.
Diagnosing the controller using Bottom-up approach.
Bottom-up technique of network troubleshooting begins from the physical components of the network
and navigates all the way to the OSI model of the network. If no problem is found at the preceding layer
the process is re-done in the successive layers until the problem is identified. This approach is very
effective if the problem is thought to be physical issue within the components of the network. This
approach in the newly created WLAN could be used once the connection to the network is done and this
requires an Access point so the WLAN needs an AP for this.
Document Page
Diagnosing the Access point.
Sometimes the AP or the adapter may be corrupted and the solution to this is to delete the entire profile
and then creating a new profile, this is done the command prompt that is for windows but for Kali Linux
it can be done straightly from the shell.
1 Opening the command prompt and run as the administrator.
2 write the netsh command; netsh wlan delete profile name= HCK and press enter.
These kind of problems may emanate from the use of outdated drivers hence the drivers may need to
be re-installed.
After the driver re-installation and updating is finished, enter the following commands in the CMD still
running as the administrator: netsh winsock reset
netsh int ip reset
ipconfig /release
ipconfig /renew
ipconfig /flushdns
Note: There is a need to restart the computer or the router after every command.
Document Page
Once the commands have been executed correctly, check the wireless adapter on the machines if they
are enabled if not enable them and reset the router to new settings then connect.
Bottom-up diagrammatical representation.
Application
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Client and Guest Access.
Client guest issues can be well diagnosed by the CMD command
Netsh wlan show wlanreport command and receive a html format report from which one can hover
every session then see the performance and problems.
Transport
Network
Data link
Physical start
Document Page
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]