Assignment 2 Week 4
Assignment 2 Week 4
Conclusions……………………………………………………14
Introduction
In the rapidly evolving landscape of networking, the configuration of wireless local area
networks (WLANs) is a critical skill for ensuring reliable and secure connectivity in both home
and enterprise environments. This report details the configuration process of a WLAN using
Cisco's Packet Tracer simulation tool. The primary objective of this activity is to establish a
robust wireless network by implementing both WPA2-PSK and WPA2-Enterprise security
protocols.
Through this hands-on exercise, we will configure a home wireless router and a Wireless LAN
Controller (WLC), accommodating a diverse range of devices while adhering to best practices in
security and network management. The addressing table provided outlines the various devices
and their respective IP addresses, serving as a roadmap for the configuration process.
The report is structured into two main parts: the first focuses on the setup of a home wireless
router, including DHCP settings, WLAN configuration, and security protocols. The second part
delves into the configuration of a WLC-based network, highlighting the establishment of
multiple WLANs, integration with a RADIUS server for enterprise authentication, and the
implementation of effective DHCP management.
WLAN Information
WLAN SSID Authentication Username Password
Procedure
Part 1: Configure a Home Wireless Router.
I installed a new home wireless router at a friend’s house. I change settings on the router to enhance
security and meet my friend’s requirements.
c. Verify connectivity. The hosts should be able to ping each other and the web server. They should
also be able to reach the web server URL.
The devices were able to ping each other.
b. Wireless Host 2 was connected to Wireless VLAN 5 using the credentials in the WLAN
information table.
Setting up the connectivity and configuration
CONCLUSIONS
The WLAN configuration project utilizing Cisco's Packet Tracer proved to be a comprehensive
exercise in establishing a secure and efficient wireless network. By effectively configuring both a
home wireless router and a Wireless LAN Controller (WLC), we successfully implemented key
security protocols, including WPA2-PSK and WPA2-Enterprise.
The step-by-step approach to setting up DHCP, VLAN interfaces, and integrating RADIUS
authentication ensured a robust network structure tailored to accommodate diverse devices while
maintaining high standards of security. The successful connectivity tests demonstrated the
effectiveness of our configurations, confirming that devices could communicate seamlessly and
access network resources as intended.
The WLAN configuration using Packet Tracer was successfully implemented, allowing for
secure connectivity across various devices. Both WPA2-PSK and WPA2-Enterprise security
protocols were established, ensuring robust network security and management. Connectivity
tests confirmed the successful configuration of the WLAN, making it suitable for both home
and enterprise environments.