MikroTik Certified Network Associate (MTCNA)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 IP Addressing
1-5 Subnetting
2 Introduction to MikroTik RouterOS
2-1 RouterOS Overview
2-2 RouterOS Installation
2-3 RouterOS Licensing
2-4 RouterOS Interface Overview
2-5 RouterOS Command Line Interface (CLI)
2-6 RouterOS Graphical User Interface (GUI)
3 Basic Router Configuration
3-1 Router Identification
3-2 Interface Configuration
3-3 IP Address Assignment
3-4 Default Gateway Configuration
3-5 DNS Configuration
3-6 Basic Firewall Configuration
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF Configuration
4-4 BGP Configuration
4-5 Policy-Based Routing
5 Network Address Translation (NAT)
5-1 Introduction to NAT
5-2 Basic NAT Configuration
5-3 Port Address Translation (PAT)
5-4 One-to-One NAT
5-5 Hairpin NAT
6 Firewall and Security
6-1 Firewall Basics
6-2 Firewall Rules Configuration
6-3 NAT Rules Configuration
6-4 Traffic Shaping and QoS
6-5 VPN Basics
6-6 IPsec VPN Configuration
7 Wireless Networking
7-1 Wireless Basics
7-2 Wireless Interface Configuration
7-3 Wireless Security
7-4 Wireless Bridging
7-5 Wireless Access Point Configuration
8 Advanced Topics
8-1 VLAN Configuration
8-2 DHCP Server Configuration
8-3 DHCP Relay Configuration
8-4 PPPoE Server Configuration
8-5 PPPoE Client Configuration
8-6 Hotspot Configuration
8-7 Load Balancing
8-8 High Availability (Failover)
9 Troubleshooting and Maintenance
9-1 Basic Troubleshooting Techniques
9-2 Log Analysis
9-3 Backup and Restore
9-4 Firmware Updates
9-5 System Monitoring
10 Practical Exercises
10-1 Basic Router Configuration Exercise
10-2 Static Routing Exercise
10-3 NAT Configuration Exercise
10-4 Firewall Configuration Exercise
10-5 Wireless Configuration Exercise
10-6 Advanced Configuration Exercise
10-7 Troubleshooting Exercise
7-3 Wireless Security Explained

7-3 Wireless Security Explained

Wireless security is crucial for protecting data transmitted over Wi-Fi networks. Understanding the key concepts of wireless security is essential for the MikroTik Certified Network Associate (MTCNA) certification.

Key Concepts

1. Encryption Protocols

Encryption protocols secure wireless communications by converting data into a format that cannot be easily understood by unauthorized users. Common encryption protocols include:

2. Authentication Methods

Authentication methods verify the identity of users attempting to access the wireless network. Common methods include:

3. MAC Filtering

MAC filtering allows or denies access based on the Media Access Control (MAC) address of the device. Each network interface has a unique MAC address.

4. Hidden SSID

Hiding the Service Set Identifier (SSID) prevents the network from being broadcast, making it less visible to potential attackers.

Detailed Explanation

Encryption Protocols

WEP is outdated and vulnerable to attacks. WPA and WPA2 use the Advanced Encryption Standard (AES) for stronger encryption. WPA3 introduces additional security features, such as forward secrecy and improved password protection.

Authentication Methods

PSK is simple and widely used, but it can be compromised if the passphrase is weak. Enterprise authentication, using RADIUS servers, provides a more secure method by requiring additional credentials and centralized management.

MAC Filtering

MAC filtering can enhance security by limiting access to specific devices. However, MAC addresses can be spoofed, so it should be used in conjunction with other security measures.

Hidden SSID

Hiding the SSID can deter casual attackers by making the network less visible. However, determined attackers can still discover the SSID through other means, so it should not be relied upon as the sole security measure.

Examples and Analogies

Example: Encryption Protocols

Think of encryption protocols as locks on a door. WEP is like a basic lock, easy to pick. WPA is like a combination lock, harder to crack. WPA2 is like a high-security lock, very difficult to break. WPA3 is like a modern, tamper-proof lock, offering the highest level of security.

Example: Authentication Methods

Consider authentication methods as access control systems. PSK is like a simple key, easy to use but can be lost or stolen. Enterprise authentication is like a biometric system, requiring unique identifiers (fingerprints, retinas) for access.

Example: MAC Filtering

Imagine MAC filtering as a guest list at a party. Only those on the list (authorized devices) are allowed in. However, someone can pretend to be on the list (spoof their MAC address) to gain entry.

Example: Hidden SSID

Think of hiding the SSID as keeping a party invitation private. While it makes it harder for uninvited guests to find the party, determined individuals can still discover the location through other means.

By mastering these wireless security concepts, you can protect your Wi-Fi network from unauthorized access and potential threats, ensuring a secure and reliable wireless environment.