Wireless Security. Alistair Mutch

Size: px
Start display at page:

Download "Wireless Security. Alistair Mutch"

Transcription

1 Wireless Security Alistair Mutch

2 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 2 What is the Threat? The nature of Wireless or Simple Radio Transmission Wireless LANs use Radio Frequency (RF) radiation broadcast by a transmitting device RF radiation propagates well in air and can pass through many solid obstacles You can receive at far greater range than you can connect Nothing can prevent a receiver from hearing the transmitted signal if it is in range The distance a receiver can hear the signal can be easily improved using high gain directional antennas Wireless LANs as a result can usually be heard from outside the building in which they are installed Potential eavesdroppers therefore do not need to negotiate the physical security on the building in order to attack a WLAN, thereby removing the first line of Corporate defense The Nightmare Scenario A hacker with a Pringle s can antenna sitting in the parking lot and eavesdropping on and/or actively attacking the Corporate network over the Wireless LAN

3 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 3 RF Signal Propagation Signal emitted from a single AP located in downtown Lawrence, Kansas Source: Wireless Network Visualization Project a collaborative effort between University of Kansas' Information & Telecommunications Technology Center & Kansas Applied Remote Sensing Program

4 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 4 Wi-Fi Mk1 Architecture MS-AD/Radius Proxy/Firewall Untrusted with VPN No management through F/W VPN is insecure at first FW encrypts all payload Complexity of setup Client software No virus protection Additional workload Mobile support staff Session roaming Scalability Performance 100m UTP Internet Charles@school.ac.uk Student@school.ac.uk Charles@school.ac.uk Student@school.ac.uk

5 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 5 Reality of WLAN Attack Equipment Theft, RS232 ports, Certificates on board, IP configuration, Spare UTP sockets, SNMP RF Medium Passive attacks: Sniffing, wired network traffic leakage, breaking WEP and recovering data Active attacks: RF jamming, malicious data insertion and Fuzzing SSID Association AP Impersonation using soft APs, Evil Twin attacks, Denial of Service using deauthentication and disassociation frame spoofing, 802.1X flood attacks, attacks on the AP s local management interface, admin credentials discovery, AP configuration discovery, digital certificates recovery, War Driving for AP discovery and probing (WiGLE) The Client Computer Windows Zero-Configuration Client probing for all Preferred Networks, mobile workers on Hotspots, station impersonation (MAC spoofing), Web service spoofing, direct HD access, attacks on other client devices (voice handsets, printers), attacks on wireless bridges Enumeration PSK recovery, service password sniffing & cracking, hacking password hashes, VPN Man in the Middle (MitM) attacks, Snarfing & Zero-day attacks

6 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 6 Physical Security Clean design Simple PoE 802.3af No RS-232 Port No software load No configuration files No passwords Fully monitored Accurate antenna design Kensington lock Serial number and RSA Encrypted and authenticated management comms No illegal MP on LAN

7 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 7 Content Protection RingMaster SmartPass Staff User Staff AAA 802.1x Client AES/Location Staff VLANs MS Active Dir Internet Consultant 3 4 PAYG PAYG Open/WISP Open No Encryption PAYG Supplier 802.1q Trunk 802.1q Trunk Mobility Point Guest User SmartPass 802.1x AES Contractor VLAN VoWIP Staff AAA MAC/ACL/SVP WEPs VoIP VLAN Encryption None WEP of any sort WPA-PSK (TKIP-PSK) WPA2-PSK (AES-PSK) WEPd-Ent (with 802.1x) WPA-Ent (TKIP)(with 802.1x) WPA2-Ent (AES)(with 802.1x) FIPS Product Options Authentication None MAC Ethernet Address Web Page Authentication 802.1x PEAP-MSCHAPv x EAP-TLS Certificates Machine Authentication on MS-AD Three Factor Secure ID Fob Management Web/HTTPS/TLS1 SNMP V1-3 XML/SSH with certificates Historical Logging

8 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 8 Converge WiFi and Wired to one IP LAN Henry@company.com Internet Proxy/Firewall Charles@contractor.com Unique Auth/Encrypt per user ACL IP Router DHCP Henry@company.com ESSID FHE Charles@contractor.com ) Standard MS 802.1x Client 2) Machine authentication 3) User authentication 4) Client inspection 5) MS-AD/VLAN 6) Layer 2 connection 7) Existing user experience MS-AD/Radius

9 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 9 One IP Network, Cost of Ownership 200 users remain 200 connections Same IP engineering and DHCP Same MS-AD engineering Same Firewall configuration/load Same support procedures Same IDP/IDS functions Same client experience/training Same Routing and ACL 100/user 1000 Setup 1000 VPN 5000 VPN 2000 Workload 5000 IDS Support 1000 changes Improved Client Vision Reduced Patching Reduced Moves and Changes Increased Productivity

10 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 10 Endpoint Integrity with Juniper UAC Encrypted Juniper Infranet Controller (also AAA server) VLAN = 1 VLAN = 2 Enterprise VLAN (1) 802.1X Authentication using Juniper Odyssey Supplicant/UAC Agent X Authentication using WPA/TKIP; policies are met by client 2. Infranet Controller responds with VLAN=1 assignment Quarantine VLAN (2) 3. Endpoint gains access to Enterprise VLAN 4. Infranet Controller detects that DAT files are OUTDATED 5. Endpoint is forced to re-authenticate 6. Infranet Controller updates VLAN assignment to VLAN=2; endpoint can only access Quarantine VLAN

11 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 11 Integrated Cross Location Mobility RingMaster SmartPass MS Active Dir London Mobility Domain Contractor Guest MPLS & Internet Company Wide Network Domain AD & SP to manage VoIP Paris Mobility Domain q Trunk Distribution Switch q Trunk Mobility Point Staff User Staff AAA 802.1x Client AES/Location Staff VLANs Guest Open/WISP SmartPass No Encryption Public DMZ Contractor SmartPass 802.1x AES Public DMZ VoWIP Staff AAA MAC/ACL/SVP WEPs VoIP VLAN VLANs Secure Staff (n) Guest Contractor VoIP/QoS MX-MP

12 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 12 Geographic Permissions Radio Group Senior Senior Staff Offices Radio Group Meeting Rooms Meeting Rooms Radio Group Offices Rooms Standard Rooms Standard Rooms Radio Group Cafe Reception, Restaurant Radio Group Back Office

13 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 13 Trapeze/Juniper Multi-Tiered WLAN Security Endpoint Integrity Check 802.1X Authentication Untrusted Client Juniper UAC AAA + NAC RingMaster LA200 X Rogue AP Intrusion Protection Trusted Client Encrypted X Rogue User Authentication & Encryption 802.1X, EAP-TLS, PEAP, TTLS, MAC, Web,... Endpoint Integrity Trusted Network Connect (Trusted Computing Group) Application Firewall Per user, per station, per group policy enforcement Intrusion Protection Core WIDS/WIPS: scan, detect, locate, disable Rogues i, WPA2, WPA, AES, CCMP DODD and FIPS compliant Juniper Networks Unified Access Control (UAC) Microsoft Network Access Protection (NAP) Application-aware QoS scheduling, location and security filtering Policy enforced closest to the end station Integrates with Juniper IDP Full integration with AirDefense (Market Leader WIDS/WIPS)

14 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 14 Core IDS/IPS Detected Attacks Rogue access points Interfering access points Rogue clients Interfering clients adhoc clients Unknown clients Interfering clients on wired LAN probe request flood authentication flood null data flood mgmt type 6 flood mgmt type 7 flood mgmt type d flood mgmt type e flood mgmt type f flood association flood reassociation flood disassociation flood Weak wep initialization vectors Spoofed access point mac-address attacks Spoofed client mac-address attacks Ssid masquerade attacks Spoofed deauthentication attacks Spoofed disassociation attacks Null probe responses Broadcast deauthentications FakeAP ssid attacks FakeAP bssid attacks Netstumbler clients Wellenreiter clients Active scans Wireless bridge frames Adhoc client frames Access points present in attack-list Access points not present in ssid-list Access points not present in vendor-list Clients not present in vendor-list Clients added to automatic black-list

15 Alien Management SmartPass

16 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 16 Guest Delivery Platform RingMaster SmartPass MS Active Dir London Mobility Domain Contractor Guest MPLS & Internet Company Wide Network Domain AD & SP to manage VoIP Paris Mobility Domain q Trunk Distribution Switch q Trunk Mobility Point Staff User Staff AAA 802.1x Client AES/Location Staff VLANs Guest Open/WISP SmartPass No Encryption Public DMZ Contractor SmartPass 802.1x AES Public DMZ VoWIP Staff AAA MAC/ACL/SVP WEPs VoIP VLAN VLANs Secure Staff (n) Guest Contractor VoIP/QoS MX-MP

17 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 17 SmartPass User Provisioning Software Package Typical Pentium 1Gb PC 50 Account > Unlimited IT Define groups IT define provisioners Provisioning through IE/HTTPS Single User Creation Group Provisioning Bulk Creation for Coupons WebAAA Login 802.1x Login Different VLANs for groups Firewall per user Block P2P traffic Limited/Time of day/port/filtering Full logging and snooping

18 Simple Web Interface Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 18

19 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 19 Access Rule Examples Location based Allow guest SSID users to authenticate in public areas. When a guest user roams to a private area, disconnect session. Time based Between 9:00 AM to 5:00 PM limit per user bandwidth to 1mbps Time & location based At 2:00 PM, in Classroom C, disallow internet usage. On demand Disconnect all guest users now

20 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 20 Authentication Enhancement Location Based Access Control Prevents unauthorized access from outside your space Location Based VLAN tagging Provision Network access based on Identity and Location Wireless Containment Prevents insiders from associating with outside networks Location based IDS Identifies physical location of violations, threats & attacks, rogues

21 Location Integration

22 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 22 LA-200 Capabilities Location How often is the location value correct (Accuracy) 99% How specific can a location be in size (Precision) 1m at boundaries 3-5m in open space How quickly can the system locate (Latency) near real-time How many devices can be tracked (Scalability) 1,500-2,000 devices Management Accepts RF snoop data from up to 100 Trapeze Networks APs Manageable by web interface Able to store location history info for up to 30 days Dashboard viewer for XY location viewing

23 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 23 Location Tracking of WiFi Devices Monitor location of all WiFi devices VoIP handsets PDA Laptop WiFi Tags

24 Location Tracking System Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 24

25 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 25 Access Rule Examples Location based Allow guest SSID users to authenticate in public areas. When a guest user roams to a private area, disconnect session. Time based Between 9:00 AM to 5:00 PM limit per user bandwidth to 1mbps Time & location based At 2:00 PM, in Classroom C, disallow internet usage. On demand Disconnect all guest users now

26 System Control User Monitoring

27 Constant Monitoring and Logging Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 27

28 Comprehensive Report Library Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 28

29 Trapeze Networks, A BELDEN Brand Proprietary and Confidential 15/03/2009 Slide 29 Service Distribution: Radio Groups Radios can be logically grouped by geography Radio groups can be configured to advertise services appropriate to their location, e.g. Radio Group Office Rooms Radio Group Senior Radio Group Meeting Rooms Radio Group Cafe Floor Radio Group Back Office SSIDs: SSIDs: SSIDs: SSIDs: SSIDs: Secure Staff Staff voice VIP only Secure Staff Staff voice Meetings Guest access Secure Staff Staff voice Guest access Walled Garden access Secure Staff Staff voice Secure Staff Staff voice

30 Thank you

Technical Brief. Wireless Intrusion Protection

Technical Brief. Wireless Intrusion Protection Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion

More information

Enterprise 802.11 Wireless. Alistair Mutch. Worldwide Business Development Director

Enterprise 802.11 Wireless. Alistair Mutch. Worldwide Business Development Director Enterprise 802.11 Wireless Alistair Mutch Worldwide Business Development Director Unlicenced Spectrum 802.11 b/g/n 2.4Ghz Frequency band Ch 1-13 available only 3 clear 11,54 and 270 Mbits/sec per channel

More information

WLAN INFRASTRUCTURE SOLUTION OVERVIEW. NonStop Wireless for the Always-on Enterprise

WLAN INFRASTRUCTURE SOLUTION OVERVIEW. NonStop Wireless for the Always-on Enterprise WLAN INFRASTRUCTURE SOLUTION OVERVIEW NonStop Wireless for the Always-on Enterprise RIGHT FOUNDATION FOR MOBILITY SERVICES UNMATCHED RELIABILITY Three year lead on controller virtualization with hitless

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd. Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised

More information

Integrated Health Systems. Enterprise Wireless LAN Security for Long Term Care. Integrated Systems, Inc. (866) 602-6100

Integrated Health Systems. Enterprise Wireless LAN Security for Long Term Care. Integrated Systems, Inc. (866) 602-6100 Integrated Health Systems Enterprise Wireless LAN Security for Long Term Care Integrated Systems, Inc. (866) 602-6100 Enterprise Wireless LAN Security This paper describes the challenges today s healthcare

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

APPENDIX 3 LOT 3: WIRELESS NETWORK

APPENDIX 3 LOT 3: WIRELESS NETWORK APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop

More information

Closing Wireless Loopholes for PCI Compliance and Security

Closing Wireless Loopholes for PCI Compliance and Security Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop

More information

WHITE PAPER. Enterprise Wireless LAN Security

WHITE PAPER. Enterprise Wireless LAN Security WHITE PAPER Enterprise Wireless LAN Security Preface This paper describes the challenges today s administrators face when planning data protection for their wireless networks. Paramount in this discussion

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network

WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless

More information

All You Wanted to Know About WiFi Rogue Access Points

All You Wanted to Know About WiFi Rogue Access Points All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

How To Secure Wireless Networks

How To Secure Wireless Networks Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements

More information

Recommended 802.11 Wireless Local Area Network Architecture

Recommended 802.11 Wireless Local Area Network Architecture NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless

More information

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

Wireless Technology Seminar

Wireless Technology Seminar Wireless Technology Seminar Introduction Adam Worthington Network Consultant Adam.Worthington@euroele.com Wireless LAN Why? Flexible network access for your users? Guest internet access? VoWIP? RFID? Available

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University Potential Security Vulnerabilities of a Wireless Network Implementation in a Military Healthcare Environment Jason Meyer East Carolina University Abstract This paper will look into the regulations governing

More information

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What

More information

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid

More information

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland kamcderm@cisco.com

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland kamcderm@cisco.com DESIGNING AND DEPLOYING SECURE WIRELESS LANS Karl McDermott Cisco Systems Ireland kamcderm@cisco.com 1 Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring

More information

MSC-131. Design and Deploy AirDefense Solutions Exam. http://www.examskey.com/msc-131.html

MSC-131. Design and Deploy AirDefense Solutions Exam. http://www.examskey.com/msc-131.html Motorola MSC-131 Design and Deploy AirDefense Solutions Exam TYPE: DEMO http://www.examskey.com/msc-131.html Examskey Motorola MSC-131 exam demo product is here for you to test the quality of the product.

More information

Certified Wireless Security Professional (CWSP) Course Overview

Certified Wireless Security Professional (CWSP) Course Overview Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture State of Kansas Interim Wireless Local Area Networks Security and Technical Architecture October 6, 2005 Prepared for Wireless Policy Committee Prepared by Revision Log DATE Version Change Description

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

How To Protect A Wireless Lan From A Rogue Access Point

How To Protect A Wireless Lan From A Rogue Access Point : Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other

More information

Wireless Intrusion Detection Systems (WIDS)

Wireless Intrusion Detection Systems (WIDS) Systems (WIDS) Dragan Pleskonjic CONWEX Dragan_Pleskonjic@conwex.net dragan@empowerproduction.com Motivation & idea Wireless networks are forecasted to expand rapidly (Wi-Fi IEEE 802.11a/b/g ) WLANs offer

More information

CS 356 Lecture 29 Wireless Security. Spring 2013

CS 356 Lecture 29 Wireless Security. Spring 2013 CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks Understanding WiFi Security Vulnerabilities and Solutions Dr. Hemant Chaskar Director of Technology AirTight Networks WiFi Proliferation Global WiFi Radio Chipset Sales 387 307 Millions 120 200 2005 2006

More information

Implementing Security for Wireless Networks

Implementing Security for Wireless Networks Implementing Security for Wireless Networks Action Items for this session Learn something! Take notes! Fill out that evaluation. I love to see your comments and we want to make these better! Most important:

More information

Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System

Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System Challenges in Building an Enterprise-scale WiFi Monitoring System Enhancing the Security of Corporate Wi-Fi Networks Using DAIR Scale of WLAN Microsoft s WLAN has over 5 APs Paramvir Bahl, Ranveer Chandra,

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security

More information

CISCO WIRELESS CONTROL SYSTEM (WCS)

CISCO WIRELESS CONTROL SYSTEM (WCS) CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform

More information

Network Security Best Practices

Network Security Best Practices CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual

More information

Chapter 3 Safeguarding Your Network

Chapter 3 Safeguarding Your Network Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,

More information

Legacy 802.11 Security

Legacy 802.11 Security Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol

More information

Virtual Access Points

Virtual Access Points Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.

More information

Introduction. Course Description

Introduction. Course Description Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 Introduction Insecure wireless networks at

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

Particularities of security design for wireless networks in small and medium business (SMB)

Particularities of security design for wireless networks in small and medium business (SMB) Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, tomai@econ.ubbcluj.ro

More information

WS 2000 Wireless Switch. System Reference

WS 2000 Wireless Switch. System Reference WS 2000 Wireless Switch System Reference Contents Chapter 1. Product Overview WS 2000 Wireless Switch System Reference Guide............................................. 1-2 About this Document..................................................................1-2

More information

Beyond the Firewall No. 72 March, 2012 Wireless LAN Edition

Beyond the Firewall No. 72 March, 2012 Wireless LAN Edition Wireless LAN infrastructure is now an increasingly common part of corporate enterprises. With wireless LAN infrastructure, new productivity gains can be realized. With this infrastructure though comes

More information

Security Policy. Trapeze Networks

Security Policy. Trapeze Networks MX-200R-GS/MX-216R-GS Mobility Exchange WLAN Controllers Security Policy Trapeze Networks August 14, 2009 Copyright Trapeze Networks 2007. May be reproduced only in its original entirety [without revision].

More information

Chapter 2 Wireless Settings and Security

Chapter 2 Wireless Settings and Security Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Enterprise A Closer Look at Wireless Intrusion Detection:

Enterprise A Closer Look at Wireless Intrusion Detection: White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become

More information

WHITE PAPER. Preventing Wireless Data Breaches in Retail

WHITE PAPER. Preventing Wireless Data Breaches in Retail WHITE PAPER Preventing Wireless Data Breaches in Retail Preventing Wireless Data Breaches in Retail The introduction of wireless technologies in retail has created a new avenue for data breaches, circumventing

More information

Wireless Networks. Welcome to Wireless

Wireless Networks. Welcome to Wireless Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)

More information

WHITE PAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

WHITE PAPER. Wireless LAN Security for Healthcare and HIPAA Compliance WHITE PAPER Wireless LAN Security for Healthcare and HIPAA Compliance Wireless LAN Security for Healthcare and HIPAA Compliance Wireless deployments in healthcare institutions have accelerated as mobility

More information

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong

More information

WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance WHITEPAPER Wireless LAN Security for Healthcare and HIPAA Compliance Wireless LAN Security for Healthcare and HIPAA Compliance Wireless deployments in healthcare institutions have accelerated as mobility

More information

Wireless Security: Secure and Public Networks Kory Kirk

Wireless Security: Secure and Public Networks Kory Kirk Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that

More information

Network Design Best Practices for Deploying WLAN Switches

Network Design Best Practices for Deploying WLAN Switches Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone

More information

Ensuring HIPAA Compliance in Healthcare

Ensuring HIPAA Compliance in Healthcare The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,

More information

WIRELESS SECURITY TOOLS

WIRELESS SECURITY TOOLS WIRELESS SECURITY TOOLS Johanna Janse van Rensburg, Barry Irwin Rhodes University G01j202j7@campus.ru.ac.za, b.irwin@ru.ac.za (083) 944 3924 Computer Science Department, Hamilton Building, Rhodes University

More information

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Wireless Security with Cyberoam

Wireless Security with Cyberoam White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture

More information

Industrial Communication. Securing Industrial Wireless

Industrial Communication. Securing Industrial Wireless Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum. For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health

More information

Wireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance

Wireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs are prevalent in healthcare institutions. The

More information

NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015 NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w

More information

Wireless Security for Mobile Computers

Wireless Security for Mobile Computers A Datalogic Mobile and Summit Data Communications White Paper Original Version: June 2008 Update: March 2009 Protecting Confidential and Sensitive Information It is every retailer s nightmare: An attacker

More information

WIRELESS NETWORKING SECURITY

WIRELESS NETWORKING SECURITY WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

300Mbps Wireless N Ceiling Mount Access Point

300Mbps Wireless N Ceiling Mount Access Point Datasheet Ceiling Mount Access Point 110 Highlights Wireless N speed up to 300Mbps Controller Software enables administrators to easily manage hundreds of s Supports passive PoE for convenient installation

More information

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security. Cisco Small Business Access Points

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security. Cisco Small Business Access Points Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Advanced, High-Performance Wireless Access for the Small Business Highlights Supports high-bandwidth applications

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

Chapter 1 Network Security

Chapter 1 Network Security Chapter 1 Network Security 1.1 Network Security Router Functions Routers connect networks generally based on network addresses, usually IP network addresses. They create subnets (sub-networks) which isolate

More information

Building a Wireless LAN Network

Building a Wireless LAN Network Developing a Sound Security Policy for Mobility at the Department of Defense Table of Contents Introduction 3 Architectures for mobility 3 Locking the air 3 Rogue APs 3 Uncontrolled clients 4 Active attacks

More information

MITM Man in the Middle

MITM Man in the Middle MITM Man in the Middle Wifi Packet Capturing and Session Hijacking using Wireshark Introduction The main Objective of this Attack is to make a Fake Access point and send the fake ARP Packets on same Wi-Fi

More information

NXC5200/ NWA5000-N Series Wireless LAN Controller/ 802.11 a/b/g/n Managed Access Point

NXC5200/ NWA5000-N Series Wireless LAN Controller/ 802.11 a/b/g/n Managed Access Point Higherbandwidth, higher density with full range of 802.11n s (NWA5000N Series) Comprehensive guest network management with auto guest account generator and Web authentication support Manage up to 240 APs

More information

The Speaker. 20 years in networking First half doing integration Second half building products 5 years building Wi-Fi

The Speaker. 20 years in networking First half doing integration Second half building products 5 years building Wi-Fi MultiSSID and VLAN The Speaker 20 years in networking First half doing integration Second half building products 5 years building Wi-Fi The Audience Systems Integrators and WISPs Current and future ValuePoint

More information

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9

More information

Enterprise WiFi System. Datasheet. Models: UAP, UAP-LR, UAP-PRO, UAP-AC UAP-Outdoor, UAP-Outdoor5

Enterprise WiFi System. Datasheet. Models: UAP, UAP-LR, UAP-PRO, UAP-AC UAP-Outdoor, UAP-Outdoor5 Enterprise WiFi System Models: UAP, UAP-LR, UAP-PRO, UAP-AC UAP-Outdoor, UAP-Outdoor5 Unlimited Indoor/Outdoor AP Scalability in a Unified Management System Breakthrough Speeds up to 1300 Mbps (802.11ac)

More information

300Mbps Wireless N Gigabit Ceilling Mount Access Point

300Mbps Wireless N Gigabit Ceilling Mount Access Point Datasheet 300Mbps Wireless N Gigabit Ceilling Mount Access Point 120 Highlights Wireless N speed up to 300Mbps The Controller Software enables administrators to manage hundreds of s easily from any PC

More information

chap18.wireless Network Security

chap18.wireless Network Security SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: jungkyu21@seoultech.ac.kr Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless

More information

How To Configure Voice Vlan On An Ip Phone

How To Configure Voice Vlan On An Ip Phone 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

Configuring Security Solutions

Configuring Security Solutions CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from

More information

PCI v2.0 Compliance for Wireless LAN

PCI v2.0 Compliance for Wireless LAN PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

HIPAA Compliance for the Wireless LAN

HIPAA Compliance for the Wireless LAN White Paper HIPAA Compliance for the Wireless LAN JUNE 2015 This publication describes the implications of HIPAA (the Health Insurance Portability and Accountability Act of 1996) on a wireless LAN solution,

More information

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security 1 Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security for Hospitals: Various Solutions to Meet HIPAA Requirements. Jody Barnes East

More information

RingMaster : Enterprise Wi-Fi Management

RingMaster : Enterprise Wi-Fi Management RingMaster : Enterprise Wi-Fi Management RingMaster is a richly-featured, innovative, easy-to-use, full-lifecycle enterprise WLAN management suite. RingMaster enables network managers to perform all critical

More information