Configuration Troubleshooting
With all due respect to the fine network techs in the field, the most common type of wireless networking problem is misconfigured hardware or software. That's right-the dreaded user error! Given the complexities of wireless networking, this isn't so surprising. All it takes is one slip of the typing finger to throw off your configuration completely. The things that you're most likely to get wrong are the SSID and security configuration.
Verify SSID configuration on your access point first, and then check on the affected wireless nodes. Most wireless devices enable you to use any characters in the SSID, including blank spaces. Be careful not to add blank characters where they don't belong, such as trailing blank spaces behind any other characters typed into the name field. If you're using MAC address filtering, make sure the MAC address of the client that's attempting to access the wireless network is on the list of accepted users. This is particularly important if you swap out NICs on a PC, or if you introduce a new PC to your wireless network.
Check the security configuration to make sure that all wireless nodes and access points match. Mistyping an encryption key prevents the affected node from talking to the wireless network, even if your signal strength is 100 percent! Remember that many access points have the capability to export encryption keys onto a floppy disk or other removable media. It's then a simple matter to import the encryption key onto the PC using the wireless NIC's configuration utility. Remember that the encryption level must match on access points and wireless nodes. If your WAP is configured for 128-bit encryption, all nodes must also use 128-bit encryption.
In this tutorial:
- Wireless Networking
- Historical/Conceptual
- Wi-Fi Standards
- 802.11
- Hardware
- Software
- Wireless Network Modes
- Infrastructure Mode
- Speed
- BSSID, SSID, and ESSID
- Broadcasting Frequency
- Channels
- CSMA/CA
- 802.11b
- 802.11a
- 802.11g
- 802.11n
- Wireless Networking Security
- MAC Address Filtering
- Wireless Authentication
- Data Encryption
- Power Over Ethernet
- Implementing Wi-Fi
- Installing the Client
- Setting Up an Ad Hoc Network
- Placing Access Point
- Access Point Configuration
- Configuring Encryption
- Configuring the Client
- Adding a WAP
- Troubleshooting Wi-Fi
- Hardware Troubleshooting
- Software Troubleshooting
- Connectivity Troubleshooting
- Configuration Troubleshooting