WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
|
|
- Kathryn Hamilton
- 8 years ago
- Views:
Transcription
1 WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection
2 Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE standard for Wireless Local Area Networks (WLANs). Several known vulnerabilities and attack tools have compromised WEP, making it unsuitable for secure WLAN implementations without additional layers of security. Motorola s WEP Cloaking solution is designed to make WEP virtually invulnerable to known attacks and tools, making existing WEP deployments much stronger than they otherwise would be. Motorola s WEP Cloaking module leverages the Motorola Wireless Intrusion Prevention System (WIPS) using wireless monitoring sensors to protect handheld devices, in use at thousands of retailers world-wide, from passive and active attempts to crack WEP encryption keys. These wireless handheld devices, such as point of sale systems, barcode scanners and VoIP handsets commonly support only WEP encryption which can be easily broken with popular cracking tools. Motorola Wireless IPS in combination with the WEP Cloaking module provides enterprises peace of mind from security and compliance issues.
3 Motorola WEP Cloaking TM WEP Cloaking does not require any hardware or software modifications to the legacy WLAN infrastructure. It is designed to work seamlessly through the Motorola Wireless Intrusion Prevention System. The remote monitoring sensors analyze all the received packets locally, collect several statistics and events of interest, and use a bandwidth efficient secure TCP/IP communication link to aggregate information in a centralized server appliance. The Motorola Wireless IPS system provides: a centralized repository of all current and historical information management and troubleshooting policy definition wizards reporting and compliance modules WEP Cloaking is an add-on module to the Motorola Wireless IPS platform that uses the same WIPS sensors to constantly protect access points (AP s), laptops and handheld devices, by intelligently injecting chaff WEP frames designed to confuse WEP attack tools. By default, the sensor is a passive wireless monitoring device and does not transmit (provided AirLockdown is not active). Enabling the sensors for WEP cloaking will cause the sensors to actively transmit on the channels of the AP s it is protecting. WIPS sensors communicate with the server to coordinate cloaking operation. The server can be configured to instruct a group of sensors to cloak authorized devices in a given location. Sensors are designed to intelligently adjust their frequency scanning patterns to maximize cloaking effectiveness while performing regular Wireless IPS scanning on other channels. More than one sensor can cloak a single wireless device depending on spatial coverage. Once configured for cloaking, sensors intelligently analyze local traffic and insert carefully timed cloaking frames as shown in Figure 1. To attackers, who do not have the secret WEP key, these cloaking frames appear as legitimate WEP traffic between authorized devices. Authorized devices, configured with the production WEP key, automatically ignore the cloaking frames as their integrity test fails. Figure 1: WEP Cloaking with Motorola Sensors 3 WHITE PAPER: WEP Cloaking TM for Legacy Encryption Protection
4 An attacker sniffing traffic will not be able to distinguish between cloaking frames and legitimate frames, and therefore, cannot filter out the cloaked frames. When statistical WEP cracking tools are run on the captured data, they simply fail to decode the key. Figure 2 depicts a screenshot of aircrack-ng with WEP Cloaking enabled. Figure 2: Screen shot of WEP cracking failure with Aircrack-ng In the event of a wired network outage, if sensors lose connection with the centralized server, they will continue to cloak. In addition, WEP Cloaking is optimized to not disturb the wireless environment or impact Wireless LAN performance. The sensors use countermeasures, correlation through the server and mutual coordination over the air to maximize the effectiveness of cloaking with nominal wired and wireless bandwidth consumption. Sensor Deployment Motorola Wireless IPS uses remote sensors to collect data transmitted by a-, b-, and g compliant devices in the 2.4 GHz and/or 5 GHz spectrum. Every site is unique in terms of actual sensor coverage. This section merely describes sensor placement and respective coverage in a simplified way. Actual radio frequency (RF) signal propagation is a very complex issue due to environmental factors like the reflection and absorption properties of different building materials such as walls, furniture, elevator shafts, large moving objects, etc. Please refer to the WIPS User Guide for more detailed information on sensor deployment considerations such as: Building Structure - Many materials used in building construction may significantly impact the propagation of signals in the 2.4GHz or 5 GHz spectrum. Device Density and Location - You should consider the density and location of your wireless a, b, and g devices. Assets to be Protected - Wireless-capable devices that contain sensitive data must be protected. Power and Data cabling - Sensors are often placed in areas that take advantage of preexisting power and data cabling. 4 WHITE PAPER: WEP Cloaking TM for Legacy Encryption Protection
5 Application choice will significantly impact the sensor density and sensor placement. For example, rogue detection in a no wireless zone needs fewer sensors as even sporadic emanations from a wireless device, at the lowest data rate and longest range, can reveal the presence of a rogue. As the applications become more complex, they may require a representative sample of frames or meet certain minimum signal level thresholds, increasing the sensor density requirement. Using these factors in baseline decisions with regard to sensor placement, the following coverage area guidelines may be applied to establish an effective deployment: b/g (2.4GHz) WEP Cloaking & Location Tracking Connection Termination Policy Enforcement Rogue Detection Indoor/Office 15,000 17,000 20,000 30,000 Warehouse, Distribution, Manufacturing 19,000 22,000 30,000 45,000 Outdoor, Hangar 25,000 30,000 40,000 60, a(5 GHz) WEP Cloaking & Location Tracking Connection Termination Policy Enforcement Rogue Detection Indoor/Office 11,000 14,000 17,000 25,000 Warehouse, Distribution, Manufacturing 17,000 19,000 26,000 35,000 Outdoor, Hangar 19,000 24,000 30,000 45,000 Figure 3: Baseline sensor coverage numbers (in square feet) by application 5 WHITE PAPER: WEP Cloaking TM for Legacy Encryption Protection
6 WEP Cloaking will typically require a higher density of sensor deployment than most other applications. This puts WEP cloaking in the highest category sensor density deployments similar to Location Tracking. For effective WEP Cloaking, there are two other important considerations: 1. Spatial coverage - The sensors enabled with WEP Cloaking must at a minimum cover the same area as the authorized Access Points and Stations they are protecting. For this requirement, you should leverage any site surveys you conduct or have conducted for placement of Access Points as aids to sensor placement decisions. Another option is using a WLAN simulation tool such as LANPlanner. Figure 4 below shows a simulation of access point coverage based on the building s RF properties loaded into the system. For example, in a typical retail location most wireless point-of-sale devices will be in the front of the store near the check-out stations. Assuming the hacker would be outside of the building, sitting in the front parking lot, it would make sense to place at least 2 sensors in each of the corners in the front of the store. If there is public access from the back of the building, or the retail location is surrounded by parking areas, you may want to consider additional sensors in the back for complete protection. 2. Channel coverage - A single sensor should not be required to cloak more than 3 authorized access points at a time. For effective cloaking there must be sufficient chaff WEP frames to confuse the statistical WEP cracking tools. At the same time the sensors must perform regular Wireless IPS scanning on other channels. The sensors are designed to intelligently adjust their frequency scanning patterns. However, to maximize cloaking effectiveness and scan all other channels for possible intrusions, sensors should not be expected to cloak more than three authorized AP s, or more specifically 3 unique communication channels, at a time. Figure 4: WLAN AP coverage simulation with LANPlanner 6 WHITE PAPER: WEP Cloaking TM for Legacy Encryption Protection
7 Typically, it will take several sensors deployed at the perimeter of the building to adequately protect all wireless devices with WEP Cloaking. This also implies that, even in small stores, it may take more than one sensor for adequate WEP Cloaking protection; the higher the density of sensors you deploy, the better your legacy encryption devices will be protected. Any deployment should start with a site survey or RF simulation of the WLAN environment, followed by a mapping of sensor coverage to access point coverage of unique channels. WEP Cloaking Best Practices Although wireless security professionals have long recognized the need to use technologies stronger than WEP, organizations may require months or years before such a change can be fully implemented. There are millions of legacy WEP devices already deployed, such as wireless scanners, barcode readers, Wi-Fi phones, and embedded Wi-Fi clients. Many of these devices may not be firmware upgradeable to stronger encryption protocols. The Motorola WEP Cloaking solution extends the shelf-life of existing WLAN infrastructure deployments or protects companies that are in the process of upgrading to a stronger protocol during that transition. The only way for organizations to fortify their wireless networks is to use a layered approach to security. Following is a list of recommendations for securing a wireless network that must include WEP wireless devices: When choosing your WEP key, it is best to use a randomly chosen hexadecimal key. Analyze the power output of the APs to ensure that the AP is not transmitting any further than is necessary. Authorize only specific data rates: o Check the AP s allowed data rates to ensure that unnecessarily distant wireless associations, which would result in a low negotiated data rate, do not provide a wireless client access to the network through the AP. o If the AP is b/g and the stations which require WEP are b devices and not g, disable the AP from supporting data rates higher than 11 Mbps. Product Documentation Additional documentation for Motorola s Wireless IPS system can be found in: Online Help Resident in the Wireless IPS application Motorola User Guide Quick Start Guides These guides include WIPS installation and setup instructions for the WIPS Server, Sensors, and User access. Updated Quick Starts are shipped with your WIPS server software. Use Motorola WEP Cloaking to protect the wireless network using WEP Encryption. Enable policy-based termination on a Rogue Station and Replay Injection Attack alarms If the access points support PSPF (Public Secure Packet Forwarding) mode, also referred to as AP isolation, you must enable it. PSPF mode prevents wireless client to wireless client communication and will limit the effectiveness of typical replay attack. 7 WHITE PAPER: WEP Cloaking TM for Legacy Encryption Protection
8 motorola.com Part number WP-WEBCLOAK. Printed in USA 06/08. MOTOROLA and the Stylized M Logo and Symbol and the Symbol Logo are registered in the US Patent & Trademark Office. WEP Cloaking is a registered trademark of AirDefense. All other product or service names are the property of their respective owners. Motorola, Inc All rights reserved. For system, product or services availability and specific information within your country, please contact your local Motorola office or Business Partner. Specifications are subject to change without notice.
WHITE PAPER. WEP Cloaking TM Maximizing ROI from Legacy Wireless LAN
WHITE PAPER WEP Cloaking TM Maximizing ROI from Legacy Wireless LAN WEP Cloaking TM Maximizing ROI from Legacy Wireless LAN Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original
More informationWHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
More informationMotorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost
Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations
More informationA Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
More informationAIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
More informationEnterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
More informationWIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
More informationWHITE PAPER. Control your network: Comprehensive management for demanding wireless networks
WHITE PAPER Control your network: Comprehensive management for demanding wireless networks Executive Summary There are four basic components essential to wireless network management: planning, security,
More informationAIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
More informationwhite paper october 2011 TIRED OF ROGUES? Networks
white paper october 2011 TIRED OF ROGUES? Solutions for Detecting and Eliminating Rogue Wireless Networks Tired of Rogues? This paper provides an overview of the different types of rogue wireless devices,
More informationChapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
More informationPCI Wireless Compliance with AirTight WIPS
A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
More informationMotorola RF Management Suite
Motorola RF Management Suite The Wireless LAN (WLAN) management challenge A successful wireless LAN deployment is measured by how well the network meets the performance and capacity requirements of your
More informationWireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
More informationOverview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
More informationBest Practices for Deploying Wireless LANs
Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the
More informationWHITE PAPER. Wireless LAN Security for Healthcare and HIPAA Compliance
WHITE PAPER Wireless LAN Security for Healthcare and HIPAA Compliance Wireless LAN Security for Healthcare and HIPAA Compliance Wireless deployments in healthcare institutions have accelerated as mobility
More informationWireless Networks. Keeping your network running smooth and secure with the latest security and site analyses
Wireless Networks Keeping your network running smooth and secure with the latest security and site analyses A wireless network can be one of the most important features of your business, creating efficiencies,
More informationEnsuring HIPAA Compliance in Healthcare
The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,
More informationCISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
More informationWireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance
Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs are prevalent in healthcare institutions. The
More informationHow To Manage A Wireless Network With Avaya Wlan 9100 Series (Wlan) System (Wos)
Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network
More informationCisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
More informationIntegrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment
Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment Table of Contents Introduction 3 Limitations in WIDS monitoring 3 Monitoring weaknesses 3 Traffic analysis
More informationBest Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
More informationMotorola RF Management Suite
Motorola RF Management Suite The Wireless LAN (WLAN) management challenge A successful wireless LAN deployment is measured by how well the network meets the performance and capacity requirements of your
More informationMotorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions
Motorola Wireless Broadband Point-to-Multipoint (PMP) Access Network Solutions Motorola Technology is as Simple as it is Powerful Motorola Wireless Broadband Point-to-Multipoint (PMP) solutions are streamlined,
More informationObserver Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
More informationUnique Visualization and Management Capabilities Deliver Superior Wireless Network Reliability
SOLUTION PAPER Unique Visualization and Management Capabilities Deliver Superior Wireless Network Reliability The Motorola One Point Wireless Suite s management tools leverage innovative real-time visualization
More informationCentralized WLAN Troubleshooting
WHITE PAPER Centralized WLAN Troubleshooting Maximizing Wireless Network Availability Wireless Local Area Networks (WLAN) have proliferated within the enterprise. The business efficiencies realized though
More informationDeploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
More informationAvaya WLAN Orchestration System
Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network
More informationBeyond the Firewall No. 72 March, 2012 Wireless LAN Edition
Wireless LAN infrastructure is now an increasingly common part of corporate enterprises. With wireless LAN infrastructure, new productivity gains can be realized. With this infrastructure though comes
More informationAll You Wanted to Know About WiFi Rogue Access Points
All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com
More informationCloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet
Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers The Relay2 Smart Access Point (RA100) is an enterprise-class access point designed for deployment in high-density environments
More informationDesigning, Securing and Monitoring 802.11a/b/g/n Wireless Networks
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks The importance of Wireless today Increasingly in the Corporate Environment, Wireless is becoming an enabling technology to facilitate
More informationINFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationThe All-in-One, Intelligent WLAN Controller
The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs ZyMESH mitigates complex, inconvenient cabling Wi-Fi deployments Client steering enhances efficiency of wireless spectrum
More informationHANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
More informationAvaya WLAN Orchestration System
Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network
More informationWi-Fi, Health Care, and HIPAA
AN AIRMAGNET TECHNICAL WHITE PAPER Wi-Fi, Health Care, and HIPAA WLAN Management in the Modern Hospital by Wade Williamson WWW.AIRMAGNET.COM This page contains no topical information. Table of Contents
More informationHow To Unify Your Wireless Architecture Without Limiting Performance or Flexibility
w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you
More informationWHITE PAPER. Enterprise Wireless LAN Security
WHITE PAPER Enterprise Wireless LAN Security Preface This paper describes the challenges today s administrators face when planning data protection for their wireless networks. Paramount in this discussion
More informationDeploy WiFi Quickly and Easily
Deploy WiFi Quickly and Easily Table of Contents 3 Introduction 3 The Backhaul Challenge 4 Effortless WiFi Access 4 Rate Limiting 5 Traffic Filtering 5 Channel Selection 5 Enhanced Roaming 6 Connecting
More informationWireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
More informationLink Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
More informationWireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
More informationADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
More informationWireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
More informationEnsuring HIPAA Compliance in Healthcare
White paper Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors, nurses, and staff while remaining connected
More informationAir Marshal. White Paper
White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System
More informationROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationOptiView XG Network Analysis Tablet - Wireless Version The tablet for WiFi network engineers and integrators
OptiView XG Network Analysis Tablet - Wireless Version The OptiView XG is the first tablet specifically designed for the Network Engineer. The wireless version integrates multiple wireless radios and the
More informationCWNA Instructor Led Course Outline
CWNA Instructor Led Course Outline Enterprise Wi-Fi Administration, Outline v7.0 Introduction The Enterprise Wireless LAN Administration 7.1 course (which prepares students for the CWNA-106 exam), whether
More informationWireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
More informationWireless like Wired reliability delivered
Service Assurance Made Easy Meru Service Assurance Management Suite Forrester found that organizations using the Meru solution can benefit from potentially avoiding repeated site surveys, reducing the
More informationSecurity in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
More informationHow to Make Your Wireless LAN Work:
WHITE PAPER How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity February 2006 How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity 1 WLAN Design Challenges
More informationTesting a Wireless LAN
Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification
More informationWireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
More informationHow To Set Up A Cisco Wap121 Wireless N Access Point With Single Point Setup
Data Sheet Cisco WAP121 Wireless-N Access Point with Single Point Setup Secure, Easy-to-Deploy, Affordable Wireless-N Connectivity Highlights Provides affordable high-bandwidth 802.11n wireless connectivity
More informationIREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
More informationDon t Let Wireless Detour Your PCI Compliance
Understanding the PCI DSS Wireless Requirements A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc.
More informationOptimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
More informationSpectrum Analysis How-To Guide
Spectrum Analysis How-To Guide MOTOROLA SOLUTIONS and the Stylized M Logo are registered in the US Patent & Trademark Office. Motorola Solutions, Inc. 2012. All rights reserved. Spectrum Analysis 3 Contents
More informationThe next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
More informationNetworking: Certified Wireless Network Administrator Wi Fi Engineering CWNA
coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,
More informationWLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
More informationTop 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
More informationLegacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
More informationChapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
More informationA Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys
More informationEbonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
More informationConfiguration Guide. How to Configure the AP Profile on the DWC-1000. Overview
Configuration Guide How to Configure the AP Profile on the DWC-1000 Overview This guide describes how to configure the DWC-1000 D-Link Unified Controller s AP profile for batch AP management. How to Configure
More informationSarbanes-Oxley Compliance and Wireless LAN Security
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc. All rights reserved. While at first glance, Sarbanes-Oxley
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationFirewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
More informationKey Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.
802.11a/n Long Range Wireless Outdoor CPE Key Features IEEE 802.11 a/n compliant Up to 300Mbps (5GHz) 24V Proprietary PoE support Waterproof Housing IP65 rated AP/CB/CR/WDS Modes 4 SSIDs support + VLAN
More informationWHITE PAPER. Managing the Mobile Edge: The Unique Challenges and Requirements for Successful Management of Mobility Solutions
WHITE PAPER Managing the Mobile Edge: The Unique Challenges and Requirements for Successful Management of Mobility Solutions The power of mobility solutions in the enterprise is proven: companies all over
More informationWHITE PAPER. Preventing Wireless Data Breaches in Retail
WHITE PAPER Preventing Wireless Data Breaches in Retail Preventing Wireless Data Breaches in Retail The introduction of wireless technologies in retail has created a new avenue for data breaches, circumventing
More informationChapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
More informationWireless Security with Cyberoam
White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture
More informationAPC series overview. Copyright 2014 Deliberant LLC
APC series overview APC series - overview Deliberant s APC series product line includes a comprehensive variety of devices to meet the most demanding of applications. All the products utilize unlicensed
More informationWireless 802.11g CF Card User Manual
Wireless 802.11g CF Card User Manual Version 1.0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic,
More informationClean wireless. High-performance clean wireless solutions
Clean wireless High-performance clean wireless solutions The demands on organizations wireless networks such as increased connection counts, bandwidth consumption, need for seamless roaming and extended
More informationPREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS A Guide to combating WLAN DoS Vulnerabilities Executive Summary Wireless communications that use a shared Radio Frequency (RF) medium are often vulnerable
More informationRecommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
More informationMotorola SMART Branch. Easy, cost-effective 802.11n wireless networking for branch offices
Motorola SMART Branch Easy, cost-effective 802.11n wireless networking for branch offices Deliver easy and affordable 802.11n business critical voice and data to one branch office or thousands... with
More informationWireless Network Security. Pat Wilbur Wireless Networks March 30, 2007
Wireless Network Security Pat Wilbur Wireless Networks March 30, 2007 Types of Attacks Intrusion gain unauthorized access to a network in order to use the network or Internet connection Types of Attacks
More informationCertified Wireless Security Professional (CWSP) Course Overview
Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption
More informationCISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE
CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE BLUEPRINT Cisco Small and Medium Business Class Solutions Cisco offers small and medium-sized business customers a suite of intelligent
More informationMeraki Wireless Solution Comparison
Meraki Wireless Solution Comparison Why Meraki? Simplified cloud management Intuitive interface allows devices to be configured in minutes without training or dedicated staff Centrally manage thousands
More informationChapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
More informationClosing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
More informationWI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
More informationAccess Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
More information