WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Size: px
Start display at page:

Download "WHITE PAPER. WEP Cloaking for Legacy Encryption Protection"

Transcription

1 WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection

2 Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE standard for Wireless Local Area Networks (WLANs). Several known vulnerabilities and attack tools have compromised WEP, making it unsuitable for secure WLAN implementations without additional layers of security. Motorola s WEP Cloaking solution is designed to make WEP virtually invulnerable to known attacks and tools, making existing WEP deployments much stronger than they otherwise would be. Motorola s WEP Cloaking module leverages the Motorola Wireless Intrusion Prevention System (WIPS) using wireless monitoring sensors to protect handheld devices, in use at thousands of retailers world-wide, from passive and active attempts to crack WEP encryption keys. These wireless handheld devices, such as point of sale systems, barcode scanners and VoIP handsets commonly support only WEP encryption which can be easily broken with popular cracking tools. Motorola Wireless IPS in combination with the WEP Cloaking module provides enterprises peace of mind from security and compliance issues.

3 Motorola WEP Cloaking TM WEP Cloaking does not require any hardware or software modifications to the legacy WLAN infrastructure. It is designed to work seamlessly through the Motorola Wireless Intrusion Prevention System. The remote monitoring sensors analyze all the received packets locally, collect several statistics and events of interest, and use a bandwidth efficient secure TCP/IP communication link to aggregate information in a centralized server appliance. The Motorola Wireless IPS system provides: a centralized repository of all current and historical information management and troubleshooting policy definition wizards reporting and compliance modules WEP Cloaking is an add-on module to the Motorola Wireless IPS platform that uses the same WIPS sensors to constantly protect access points (AP s), laptops and handheld devices, by intelligently injecting chaff WEP frames designed to confuse WEP attack tools. By default, the sensor is a passive wireless monitoring device and does not transmit (provided AirLockdown is not active). Enabling the sensors for WEP cloaking will cause the sensors to actively transmit on the channels of the AP s it is protecting. WIPS sensors communicate with the server to coordinate cloaking operation. The server can be configured to instruct a group of sensors to cloak authorized devices in a given location. Sensors are designed to intelligently adjust their frequency scanning patterns to maximize cloaking effectiveness while performing regular Wireless IPS scanning on other channels. More than one sensor can cloak a single wireless device depending on spatial coverage. Once configured for cloaking, sensors intelligently analyze local traffic and insert carefully timed cloaking frames as shown in Figure 1. To attackers, who do not have the secret WEP key, these cloaking frames appear as legitimate WEP traffic between authorized devices. Authorized devices, configured with the production WEP key, automatically ignore the cloaking frames as their integrity test fails. Figure 1: WEP Cloaking with Motorola Sensors 3 WHITE PAPER: WEP Cloaking TM for Legacy Encryption Protection

4 An attacker sniffing traffic will not be able to distinguish between cloaking frames and legitimate frames, and therefore, cannot filter out the cloaked frames. When statistical WEP cracking tools are run on the captured data, they simply fail to decode the key. Figure 2 depicts a screenshot of aircrack-ng with WEP Cloaking enabled. Figure 2: Screen shot of WEP cracking failure with Aircrack-ng In the event of a wired network outage, if sensors lose connection with the centralized server, they will continue to cloak. In addition, WEP Cloaking is optimized to not disturb the wireless environment or impact Wireless LAN performance. The sensors use countermeasures, correlation through the server and mutual coordination over the air to maximize the effectiveness of cloaking with nominal wired and wireless bandwidth consumption. Sensor Deployment Motorola Wireless IPS uses remote sensors to collect data transmitted by a-, b-, and g compliant devices in the 2.4 GHz and/or 5 GHz spectrum. Every site is unique in terms of actual sensor coverage. This section merely describes sensor placement and respective coverage in a simplified way. Actual radio frequency (RF) signal propagation is a very complex issue due to environmental factors like the reflection and absorption properties of different building materials such as walls, furniture, elevator shafts, large moving objects, etc. Please refer to the WIPS User Guide for more detailed information on sensor deployment considerations such as: Building Structure - Many materials used in building construction may significantly impact the propagation of signals in the 2.4GHz or 5 GHz spectrum. Device Density and Location - You should consider the density and location of your wireless a, b, and g devices. Assets to be Protected - Wireless-capable devices that contain sensitive data must be protected. Power and Data cabling - Sensors are often placed in areas that take advantage of preexisting power and data cabling. 4 WHITE PAPER: WEP Cloaking TM for Legacy Encryption Protection

5 Application choice will significantly impact the sensor density and sensor placement. For example, rogue detection in a no wireless zone needs fewer sensors as even sporadic emanations from a wireless device, at the lowest data rate and longest range, can reveal the presence of a rogue. As the applications become more complex, they may require a representative sample of frames or meet certain minimum signal level thresholds, increasing the sensor density requirement. Using these factors in baseline decisions with regard to sensor placement, the following coverage area guidelines may be applied to establish an effective deployment: b/g (2.4GHz) WEP Cloaking & Location Tracking Connection Termination Policy Enforcement Rogue Detection Indoor/Office 15,000 17,000 20,000 30,000 Warehouse, Distribution, Manufacturing 19,000 22,000 30,000 45,000 Outdoor, Hangar 25,000 30,000 40,000 60, a(5 GHz) WEP Cloaking & Location Tracking Connection Termination Policy Enforcement Rogue Detection Indoor/Office 11,000 14,000 17,000 25,000 Warehouse, Distribution, Manufacturing 17,000 19,000 26,000 35,000 Outdoor, Hangar 19,000 24,000 30,000 45,000 Figure 3: Baseline sensor coverage numbers (in square feet) by application 5 WHITE PAPER: WEP Cloaking TM for Legacy Encryption Protection

6 WEP Cloaking will typically require a higher density of sensor deployment than most other applications. This puts WEP cloaking in the highest category sensor density deployments similar to Location Tracking. For effective WEP Cloaking, there are two other important considerations: 1. Spatial coverage - The sensors enabled with WEP Cloaking must at a minimum cover the same area as the authorized Access Points and Stations they are protecting. For this requirement, you should leverage any site surveys you conduct or have conducted for placement of Access Points as aids to sensor placement decisions. Another option is using a WLAN simulation tool such as LANPlanner. Figure 4 below shows a simulation of access point coverage based on the building s RF properties loaded into the system. For example, in a typical retail location most wireless point-of-sale devices will be in the front of the store near the check-out stations. Assuming the hacker would be outside of the building, sitting in the front parking lot, it would make sense to place at least 2 sensors in each of the corners in the front of the store. If there is public access from the back of the building, or the retail location is surrounded by parking areas, you may want to consider additional sensors in the back for complete protection. 2. Channel coverage - A single sensor should not be required to cloak more than 3 authorized access points at a time. For effective cloaking there must be sufficient chaff WEP frames to confuse the statistical WEP cracking tools. At the same time the sensors must perform regular Wireless IPS scanning on other channels. The sensors are designed to intelligently adjust their frequency scanning patterns. However, to maximize cloaking effectiveness and scan all other channels for possible intrusions, sensors should not be expected to cloak more than three authorized AP s, or more specifically 3 unique communication channels, at a time. Figure 4: WLAN AP coverage simulation with LANPlanner 6 WHITE PAPER: WEP Cloaking TM for Legacy Encryption Protection

7 Typically, it will take several sensors deployed at the perimeter of the building to adequately protect all wireless devices with WEP Cloaking. This also implies that, even in small stores, it may take more than one sensor for adequate WEP Cloaking protection; the higher the density of sensors you deploy, the better your legacy encryption devices will be protected. Any deployment should start with a site survey or RF simulation of the WLAN environment, followed by a mapping of sensor coverage to access point coverage of unique channels. WEP Cloaking Best Practices Although wireless security professionals have long recognized the need to use technologies stronger than WEP, organizations may require months or years before such a change can be fully implemented. There are millions of legacy WEP devices already deployed, such as wireless scanners, barcode readers, Wi-Fi phones, and embedded Wi-Fi clients. Many of these devices may not be firmware upgradeable to stronger encryption protocols. The Motorola WEP Cloaking solution extends the shelf-life of existing WLAN infrastructure deployments or protects companies that are in the process of upgrading to a stronger protocol during that transition. The only way for organizations to fortify their wireless networks is to use a layered approach to security. Following is a list of recommendations for securing a wireless network that must include WEP wireless devices: When choosing your WEP key, it is best to use a randomly chosen hexadecimal key. Analyze the power output of the APs to ensure that the AP is not transmitting any further than is necessary. Authorize only specific data rates: o Check the AP s allowed data rates to ensure that unnecessarily distant wireless associations, which would result in a low negotiated data rate, do not provide a wireless client access to the network through the AP. o If the AP is b/g and the stations which require WEP are b devices and not g, disable the AP from supporting data rates higher than 11 Mbps. Product Documentation Additional documentation for Motorola s Wireless IPS system can be found in: Online Help Resident in the Wireless IPS application Motorola User Guide Quick Start Guides These guides include WIPS installation and setup instructions for the WIPS Server, Sensors, and User access. Updated Quick Starts are shipped with your WIPS server software. Use Motorola WEP Cloaking to protect the wireless network using WEP Encryption. Enable policy-based termination on a Rogue Station and Replay Injection Attack alarms If the access points support PSPF (Public Secure Packet Forwarding) mode, also referred to as AP isolation, you must enable it. PSPF mode prevents wireless client to wireless client communication and will limit the effectiveness of typical replay attack. 7 WHITE PAPER: WEP Cloaking TM for Legacy Encryption Protection

8 motorola.com Part number WP-WEBCLOAK. Printed in USA 06/08. MOTOROLA and the Stylized M Logo and Symbol and the Symbol Logo are registered in the US Patent & Trademark Office. WEP Cloaking is a registered trademark of AirDefense. All other product or service names are the property of their respective owners. Motorola, Inc All rights reserved. For system, product or services availability and specific information within your country, please contact your local Motorola office or Business Partner. Specifications are subject to change without notice.

WHITE PAPER. WEP Cloaking TM Maximizing ROI from Legacy Wireless LAN

WHITE PAPER. WEP Cloaking TM Maximizing ROI from Legacy Wireless LAN WHITE PAPER WEP Cloaking TM Maximizing ROI from Legacy Wireless LAN WEP Cloaking TM Maximizing ROI from Legacy Wireless LAN Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original

More information

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.

More information

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations

More information

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Enterprise A Closer Look at Wireless Intrusion Detection:

Enterprise A Closer Look at Wireless Intrusion Detection: White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

WHITE PAPER. Control your network: Comprehensive management for demanding wireless networks

WHITE PAPER. Control your network: Comprehensive management for demanding wireless networks WHITE PAPER Control your network: Comprehensive management for demanding wireless networks Executive Summary There are four basic components essential to wireless network management: planning, security,

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

white paper october 2011 TIRED OF ROGUES? Networks

white paper october 2011 TIRED OF ROGUES? Networks white paper october 2011 TIRED OF ROGUES? Solutions for Detecting and Eliminating Rogue Wireless Networks Tired of Rogues? This paper provides an overview of the different types of rogue wireless devices,

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

PCI Wireless Compliance with AirTight WIPS

PCI Wireless Compliance with AirTight WIPS A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Motorola RF Management Suite

Motorola RF Management Suite Motorola RF Management Suite The Wireless LAN (WLAN) management challenge A successful wireless LAN deployment is measured by how well the network meets the performance and capacity requirements of your

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Best Practices for Deploying Wireless LANs

Best Practices for Deploying Wireless LANs Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the

More information

WHITE PAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

WHITE PAPER. Wireless LAN Security for Healthcare and HIPAA Compliance WHITE PAPER Wireless LAN Security for Healthcare and HIPAA Compliance Wireless LAN Security for Healthcare and HIPAA Compliance Wireless deployments in healthcare institutions have accelerated as mobility

More information

Wireless Networks. Keeping your network running smooth and secure with the latest security and site analyses

Wireless Networks. Keeping your network running smooth and secure with the latest security and site analyses Wireless Networks Keeping your network running smooth and secure with the latest security and site analyses A wireless network can be one of the most important features of your business, creating efficiencies,

More information

Ensuring HIPAA Compliance in Healthcare

Ensuring HIPAA Compliance in Healthcare The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,

More information

CISCO WIRELESS CONTROL SYSTEM (WCS)

CISCO WIRELESS CONTROL SYSTEM (WCS) CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform

More information

Wireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance

Wireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs are prevalent in healthcare institutions. The

More information

How To Manage A Wireless Network With Avaya Wlan 9100 Series (Wlan) System (Wos)

How To Manage A Wireless Network With Avaya Wlan 9100 Series (Wlan) System (Wos) Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,

More information

Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment

Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment Table of Contents Introduction 3 Limitations in WIDS monitoring 3 Monitoring weaknesses 3 Traffic analysis

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Motorola RF Management Suite

Motorola RF Management Suite Motorola RF Management Suite The Wireless LAN (WLAN) management challenge A successful wireless LAN deployment is measured by how well the network meets the performance and capacity requirements of your

More information

Motorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions

Motorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions Motorola Wireless Broadband Point-to-Multipoint (PMP) Access Network Solutions Motorola Technology is as Simple as it is Powerful Motorola Wireless Broadband Point-to-Multipoint (PMP) solutions are streamlined,

More information

Observer Analyzer Provides In-Depth Management

Observer Analyzer Provides In-Depth Management Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,

More information

Unique Visualization and Management Capabilities Deliver Superior Wireless Network Reliability

Unique Visualization and Management Capabilities Deliver Superior Wireless Network Reliability SOLUTION PAPER Unique Visualization and Management Capabilities Deliver Superior Wireless Network Reliability The Motorola One Point Wireless Suite s management tools leverage innovative real-time visualization

More information

Centralized WLAN Troubleshooting

Centralized WLAN Troubleshooting WHITE PAPER Centralized WLAN Troubleshooting Maximizing Wireless Network Availability Wireless Local Area Networks (WLAN) have proliferated within the enterprise. The business efficiencies realized though

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

Avaya WLAN Orchestration System

Avaya WLAN Orchestration System Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network

More information

Beyond the Firewall No. 72 March, 2012 Wireless LAN Edition

Beyond the Firewall No. 72 March, 2012 Wireless LAN Edition Wireless LAN infrastructure is now an increasingly common part of corporate enterprises. With wireless LAN infrastructure, new productivity gains can be realized. With this infrastructure though comes

More information

All You Wanted to Know About WiFi Rogue Access Points

All You Wanted to Know About WiFi Rogue Access Points All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com

More information

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers The Relay2 Smart Access Point (RA100) is an enterprise-class access point designed for deployment in high-density environments

More information

Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks

Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks The importance of Wireless today Increasingly in the Corporate Environment, Wireless is becoming an enabling technology to facilitate

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

The All-in-One, Intelligent WLAN Controller

The All-in-One, Intelligent WLAN Controller The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs ZyMESH mitigates complex, inconvenient cabling Wi-Fi deployments Client steering enhances efficiency of wireless spectrum

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

Avaya WLAN Orchestration System

Avaya WLAN Orchestration System Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network

More information

Wi-Fi, Health Care, and HIPAA

Wi-Fi, Health Care, and HIPAA AN AIRMAGNET TECHNICAL WHITE PAPER Wi-Fi, Health Care, and HIPAA WLAN Management in the Modern Hospital by Wade Williamson WWW.AIRMAGNET.COM This page contains no topical information. Table of Contents

More information

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you

More information

WHITE PAPER. Enterprise Wireless LAN Security

WHITE PAPER. Enterprise Wireless LAN Security WHITE PAPER Enterprise Wireless LAN Security Preface This paper describes the challenges today s administrators face when planning data protection for their wireless networks. Paramount in this discussion

More information

Deploy WiFi Quickly and Easily

Deploy WiFi Quickly and Easily Deploy WiFi Quickly and Easily Table of Contents 3 Introduction 3 The Backhaul Challenge 4 Effortless WiFi Access 4 Rate Limiting 5 Traffic Filtering 5 Channel Selection 5 Enhanced Roaming 6 Connecting

More information

Wireless LAN Security: Securing Your Access Point

Wireless LAN Security: Securing Your Access Point IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What

More information

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

Ensuring HIPAA Compliance in Healthcare

Ensuring HIPAA Compliance in Healthcare White paper Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors, nurses, and staff while remaining connected

More information

Air Marshal. White Paper

Air Marshal. White Paper White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System

More information

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

OptiView XG Network Analysis Tablet - Wireless Version The tablet for WiFi network engineers and integrators

OptiView XG Network Analysis Tablet - Wireless Version The tablet for WiFi network engineers and integrators OptiView XG Network Analysis Tablet - Wireless Version The OptiView XG is the first tablet specifically designed for the Network Engineer. The wireless version integrates multiple wireless radios and the

More information

CWNA Instructor Led Course Outline

CWNA Instructor Led Course Outline CWNA Instructor Led Course Outline Enterprise Wi-Fi Administration, Outline v7.0 Introduction The Enterprise Wireless LAN Administration 7.1 course (which prepares students for the CWNA-106 exam), whether

More information

Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n

Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing

More information

Wireless like Wired reliability delivered

Wireless like Wired reliability delivered Service Assurance Made Easy Meru Service Assurance Management Suite Forrester found that organizations using the Meru solution can benefit from potentially avoiding repeated site surveys, reducing the

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

How to Make Your Wireless LAN Work:

How to Make Your Wireless LAN Work: WHITE PAPER How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity February 2006 How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity 1 WLAN Design Challenges

More information

Testing a Wireless LAN

Testing a Wireless LAN Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

How To Set Up A Cisco Wap121 Wireless N Access Point With Single Point Setup

How To Set Up A Cisco Wap121 Wireless N Access Point With Single Point Setup Data Sheet Cisco WAP121 Wireless-N Access Point with Single Point Setup Secure, Easy-to-Deploy, Affordable Wireless-N Connectivity Highlights Provides affordable high-bandwidth 802.11n wireless connectivity

More information

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management

More information

Don t Let Wireless Detour Your PCI Compliance

Don t Let Wireless Detour Your PCI Compliance Understanding the PCI DSS Wireless Requirements A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc.

More information

Optimizing Wireless Networks.

Optimizing Wireless Networks. from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical

More information

Spectrum Analysis How-To Guide

Spectrum Analysis How-To Guide Spectrum Analysis How-To Guide MOTOROLA SOLUTIONS and the Stylized M Logo are registered in the US Patent & Trademark Office. Motorola Solutions, Inc. 2012. All rights reserved. Spectrum Analysis 3 Contents

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,

More information

WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network

WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN

More information

Legacy 802.11 Security

Legacy 802.11 Security Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol

More information

Chapter 2 Wireless Settings and Security

Chapter 2 Wireless Settings and Security Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer

More information

Configuration Guide. How to Configure the AP Profile on the DWC-1000. Overview

Configuration Guide. How to Configure the AP Profile on the DWC-1000. Overview Configuration Guide How to Configure the AP Profile on the DWC-1000 Overview This guide describes how to configure the DWC-1000 D-Link Unified Controller s AP profile for batch AP management. How to Configure

More information

Sarbanes-Oxley Compliance and Wireless LAN Security

Sarbanes-Oxley Compliance and Wireless LAN Security A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc. All rights reserved. While at first glance, Sarbanes-Oxley

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode. 802.11a/n Long Range Wireless Outdoor CPE Key Features IEEE 802.11 a/n compliant Up to 300Mbps (5GHz) 24V Proprietary PoE support Waterproof Housing IP65 rated AP/CB/CR/WDS Modes 4 SSIDs support + VLAN

More information

WHITE PAPER. Managing the Mobile Edge: The Unique Challenges and Requirements for Successful Management of Mobility Solutions

WHITE PAPER. Managing the Mobile Edge: The Unique Challenges and Requirements for Successful Management of Mobility Solutions WHITE PAPER Managing the Mobile Edge: The Unique Challenges and Requirements for Successful Management of Mobility Solutions The power of mobility solutions in the enterprise is proven: companies all over

More information

WHITE PAPER. Preventing Wireless Data Breaches in Retail

WHITE PAPER. Preventing Wireless Data Breaches in Retail WHITE PAPER Preventing Wireless Data Breaches in Retail Preventing Wireless Data Breaches in Retail The introduction of wireless technologies in retail has created a new avenue for data breaches, circumventing

More information

Chapter 3 Safeguarding Your Network

Chapter 3 Safeguarding Your Network Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate

More information

Wireless Security with Cyberoam

Wireless Security with Cyberoam White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture

More information

APC series overview. Copyright 2014 Deliberant LLC

APC series overview. Copyright 2014 Deliberant LLC APC series overview APC series - overview Deliberant s APC series product line includes a comprehensive variety of devices to meet the most demanding of applications. All the products utilize unlicensed

More information

Wireless 802.11g CF Card User Manual

Wireless 802.11g CF Card User Manual Wireless 802.11g CF Card User Manual Version 1.0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic,

More information

Clean wireless. High-performance clean wireless solutions

Clean wireless. High-performance clean wireless solutions Clean wireless High-performance clean wireless solutions The demands on organizations wireless networks such as increased connection counts, bandwidth consumption, need for seamless roaming and extended

More information

PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS

PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS A Guide to combating WLAN DoS Vulnerabilities Executive Summary Wireless communications that use a shared Radio Frequency (RF) medium are often vulnerable

More information

Recommended 802.11 Wireless Local Area Network Architecture

Recommended 802.11 Wireless Local Area Network Architecture NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless

More information

Motorola SMART Branch. Easy, cost-effective 802.11n wireless networking for branch offices

Motorola SMART Branch. Easy, cost-effective 802.11n wireless networking for branch offices Motorola SMART Branch Easy, cost-effective 802.11n wireless networking for branch offices Deliver easy and affordable 802.11n business critical voice and data to one branch office or thousands... with

More information

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007 Wireless Network Security Pat Wilbur Wireless Networks March 30, 2007 Types of Attacks Intrusion gain unauthorized access to a network in order to use the network or Internet connection Types of Attacks

More information

Certified Wireless Security Professional (CWSP) Course Overview

Certified Wireless Security Professional (CWSP) Course Overview Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption

More information

CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE

CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE BLUEPRINT Cisco Small and Medium Business Class Solutions Cisco offers small and medium-sized business customers a suite of intelligent

More information

Meraki Wireless Solution Comparison

Meraki Wireless Solution Comparison Meraki Wireless Solution Comparison Why Meraki? Simplified cloud management Intuitive interface allows devices to be configured in minutes without training or dedicated staff Centrally manage thousands

More information

Chapter 2 Wireless Networking Basics

Chapter 2 Wireless Networking Basics Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).

More information

Closing Wireless Loopholes for PCI Compliance and Security

Closing Wireless Loopholes for PCI Compliance and Security Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop

More information

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,

More information

Access Point Configuration

Access Point Configuration Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give

More information