IEEE 802.1X For Wireless LANs
|
|
|
- Martha Wilkins
- 9 years ago
- Views:
Transcription
1 IEEE 802.1X For Wireless LANs John Roese, Ravi Nalmati, Cabletron Albert Young, 3Com Carl Temme, Bill McFarland, T-Span David Halasz, Aironet Paul Congdon, HP Andrew Smith, Extreme Networks Slide 1
2 Outline Deployment issues with Adaptation of IEEE 802.1X to Summary Slide 2
3 Deployment Issues With User administration Integration with existing user administration tools required (RADIUS, LDAP-based directories) Create a Windows group for wireless Any user or machine who is a member of the group has wireless access Identification via User-Name easier to administer than MAC address identification Usage accounting and auditing desirable Key management Static keys difficult to manage on clients, access points Proprietary key management solutions require separate user databases Slide 3
4 Security Issues With No per-packet authentication Vulnerability to disassociation attacks No user identification and authentication No central authentication, authorization, accounting RC4 stream cipher vulnerable to known plaintext attack Some implementations derive WEP keys from passwords No support for extended authentication Token cards, certificates, smartcards, one-time passwords, biometrics, etc. Key management issues Re-key of global keys No dynamic per-sta key management Slide 4
5 Advantages of IEEE 802.1X Open standards based Leverages existing standards: EAP (RFC 2284), RADIUS (RFC 2138, 2139) Enables interoperable user identification, centralized authentication, key management User-based identification Identification based on Network Access Identifier (RFC 2486) enables support for roaming access in public spaces (RFC 2607). Dynamic key management Centralized user administration Support for RADIUS (RFC 2138, 2139) enables centralized authentication, authorization and accounting RADIUS/EAP (draft-ietf-radius-ext-07.txt) enables encapsulation of EAP packets within RADIUS. Slide 5
6 Advantages of IEEE 802.1X, cont d Extensible authentication support EAP designed to allow additional authentication methods to be deployed with no changes to the access point or client NIC RFC 2284 includes support for password authentication (EAP-MD5), One-Time Passwords (OTP) Windows 2000 supports smartcard authentication (RFC 2716) and Security Dynamics Slide 6
7 General Topology PAE Semi-Public Network / Enterprise Edge PAE Enterprise Network Authenticator (e.g. Access Point) EAP Over RADIUS EAP Over Wireless (EAPOW) EAP Over RADIUS R A D I U S Authentication Server Supplicant Slide 7
8 IEEE 802.1X Conversation Switch Laptop computer EAPOL-Start Port connect EAPOL EAP-Request/Identity Ethernet Access blocked Radius Server RADIUS EAP-Response/Identity EAP-Request EAP-Response (credentials) EAP-Success Radius-Access-Request Radius-Access-Challenge Radius-Access-Request Radius-Access-Accept Access allowed Slide 8
9 Goals for 802.1X on Wireless LANs Minimal changes required to 802.1X and specifications 802.1X protocol same over as Client access control Support for both user and machine access control Centralized user administration RADIUS client support on Access Point Management of encryption keys Transmission of global/multicast keys from access point to client Dynamic derivation of unicast keys Roaming support Ad-hoc networking support Slide 9
10 association Access point configured to allow open and shared authentication Initial client authentication Open authentication used, since dynamically derived WEP key not yet available Client associates with access point Slide 10
11 802.1X authentication in IEEE 802.1X authentication occurs after association After association, client and access point have an Ethernet connection Prior to authentication, access point filters all non-eapol traffic from client If 802.1X authentication succeeds, access point removes the filter 802.1X messages sent to destination MAC address Client, Access Point MAC addresses known after association No need to use 802.1X multicast MAC address in EAP-Start, EAP- Request/Identity messages Prior to 802.1X authentication, access point only accepts packets with source = Client and Ethertype = EAPOL Slide 11
12 802.11/802.1X State Machine Class 1 Frames State 1: Unauthenticated, Unassociated Class 1 & 2 Frames Successful Authentication State 2: Authenticated, Unassociated DeAuthentication Notification DeAuthentication Notification Class 1, 2 &3 Frames Successful Association or Reassociation State 3: Authenticated, Associated Disassociation Notification Successful 802.1X authentication EAPOL-Logoff Class 1, 2 &3 Frames State 4: Authenticated, Associated, 802.1X Authenticated Slide 12
13 802.1X and Per-STA Session Keys How can EAPOL be used to derive per-station unicast session keys? Can use any EAP method supporting secure dynamic key derivation EAP-TLS (RFC 2716) EAP-GSS Security Dynamics Other Keys derived on client and the RADIUS server RADIUS server transmits key to access point RADIUS attribute encrypted on a hop-by-hop basis using shared secret shared by RADIUS client and server Unicast keys can be used to encrypt subsequent traffic, including EAPOW-key packet (for carrying multicast/global keys) Per-Station unicast session keys not required If only multicast/global keys are supported, then session key is only used to encrypt the multicast/global key Slide 13
14 802.1X and Multicast/Global Keys How can EAPOL transfer multicast/global keys? A new EAPOL packet type can be defined for use in transporting multicast/global keys: EAPOW-Key EAPOW-Key packet type used to transmit one or more keys from access point to client EAPOW-Key packets only sent after EAPOW authentication succeeds EAPOW-Key packets are encrypted using derived per- STA session key Slide 14
15 Laptop computer Associate EAPOL-Start 802.1X On Wireless Association Access Point Radius Server Ethernet Access blocked RADIUS EAPOW EAP-Request/Identity EAP-Response/Identity Radius-Access-Request EAP-Request EAP-Response (credentials) EAP-Success EAPW-Key (WEP) Radius-Access-Challenge Radius-Access-Request Radius-Access-Accept Access allowed Slide 15
16 Re-authentication Access points are allowed to force clients to re-associate at any time Default is 60 minutes The client responses transparently to the user Access point sends WEP global key to client using 802.lX EAPOW-Key message used to send global key Slide 16
17 Roaming Process (no pre-authentication) Re-association 802.1X will re-authenticate but network access will be denied during re-authentication Optional support for fast handoff Inter-access point protocol Handoff per client keys Use EAPOW-Key to update shared key Shared key pre-authentication Shared authentication using global WEP key If succeeds then allow immediate access to network i.e X is put immediately into the authenticated state Slide 17
18 Unauthenticated VLAN Support Potential extension to IEEE 802.1X Designed to enable access to a registration server, enrollment server, etc. prior to authentication EAP-Notification message can inform user of location of server to take credit card, enroll user, etc. prior to obtaining network access. Slide 18
19 802.1X and Ad-Hoc Networking What is ad-hoc networking? Station communicating directly with other stations How does ad-hoc networking work with 802.lX? Both Stations initiate EAPOL conversation All stations authenticate with each other Otherwise mutual authentication required and algorithm to select authenticator RADIUS not used in ad-hoc mode Typically implies that user credentials are stored on Stations Slide 19
20 Key Management for Ad-Hoc Networking Requirements Password-based mutual authentication Secure key generation Evaluation of existing EAP methods EAP-TLS: supports mutual authentication, keying, but assumes both participants have a certificate EAP-GSS: supports mutual authentication, assumes server side is in contact with KDC 802.1X will work in adhoc mode if required Shared key is better for some user scenarios May need new EAP method for this purpose Slide 20
21 How 802.1X Addresses Security Issues User Identification & Strong authentication Dynamic key derivation Mutual authentication Per-packet authentication Dictionary attack precautions Slide 21
22 Summary of /802.1X Vulnerabilities w/per 802.1X, TLS & 802.1X, TLS, packet IV Key change Key Change, MIC Global keying vulnerable fixed fixed Impersonation vulnerable fixed fixed NIC theft vulnerable fixed fixed Brute force attack (40 bit key) 128-bit 128-bit 128-bit Rogue Servers vulnerable fixed fixed Packet spoofing vulnerable vulnerable fixed Disassociation spoofing vulnerable vulnerable fixed Passive monitoring MAC Identity Identity Dictionary attacks vulnerable fixed fixed Slide 22
23 Summary IEEE 802.1X offers solutions to deployment issues User identification Centralized user management Key management Minimal changes required to specification Additional MIB parameters for 802.1X/ configuration Implementation requirements Support for dynamically derived WEP keys + mutual authentication Support for ad-hoc networking Access-Point functions as RADIUS client Requires support for RFC 2138, 2139, draft-ietf-radius-ext-07.txt Access-Point functions as IEEE 802.1X authenticator PAE Addresses most WEP security vulnerabilities Slide 23
24 Call to Action 802.1X Add changes required for Messages sent to destination MAC address for Add EAPOW-Key message Adopt 802.1X as an enhanced authentication and key management method Enable appropriate methods supported by 802.1X to be used for authentication and key management MAC changes to improve encryption, integrity protection The IAPP work needs to consider security impact re STA mobility between APs. Slide 24
25 For More Information IEEE 802.1X RADIUS EAP Slide 25
26 Simplified Insecure Adhoc Support Simple, insecure adhoc networking sometimes desirable Children playing games Need plug and go solution without security complications Not appropriate in business situations How can this be handled with 802.1X? Clients assume network is un-authenticated An authenticated network will drop packets Clients drop received EAP-Start messages Clients think they are connected to a non-authenticated network Adhoc networking just works. Slide 26
27 Why Not Incorporate 802.1X into authentication? Possible to add 802.1X support in authentication phase Requires additional authentication type for EAP Requires additional of new key management functionality in Likely to result in duplication of effort Supplicants supporting 802.1X need duplicate code for EAP Supplicant operating system sees as Requires encapsulation/decapsulation in NIC driver to maintain transparency Large changes required to state machine 802.1X state machine needs to be merged with state machine No additional security over 802.1X over approach Associate/disassociate not encrypted or integrity protected so no additional security provided by doing EAP w/key derivation prior to Associate Un-authenticated VLANs cannot be supported Choice either authenticated or unauthenticated Slide 27
IEEE 802.1X Overview. Port Based Network Access Control
IEEE 802.1X Overview Port Based Network Access Control 802.1X Motivation and History Increased use of 802 LANs in public and semi-public places Desire to provide a mechanism to associate end-user identity
How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)
Wireless LAN Security with 802.1x, EAP-TLS, and PEAP Steve Riley Senior Consultant MCS Trustworthy Computing Services So what s the problem? WEP is a euphemism Wired Equivalent Privacy Actually, it s a
802.11b Wireless LAN Authentication, Encryption, and Security
802.11b Wireless LAN Authentication, Encryption, and Security Young Kim ELEN 6951 1. Abstract With the rapid growth of wireless local area network, security has been the number one concern in this arena
Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard
Allied Telesis White Paper 802.1x White Paper Executive Summary Security and flexibility are often seen as mutually exclusive requirements in a network, yet both are equally important. Security is crucial
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
WIRELESS NETWORK SECURITY
WIRELESS NETWORK SECURITY Much attention has been focused recently on the security aspects of existing Wi-Fi (IEEE 802.11) wireless LAN systems. The rapid growth and deployment of these systems into a
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Using IEEE 802.1x to Enhance Network Security
Using IEEE 802.1x to Enhance Network Security Table of Contents Introduction...2 Terms and Technology...2 Understanding 802.1x...3 Introduction...3 802.1x Authentication Process...3 Before Authentication...3
Network security, TKK, Nov 2008 1
Outline Network security: WLAN Security LAN technology Threats against WLANs Weak security mechanisms and WEP 802.1X, WPA, 802.11i Tuomas Aura, Microsoft Research, UK 2 LAN technology LAN (WLAN) standards
What information will you find in this document?
AlliedWare TM OS How To Configure Basic 802.1x Port Authentication Introduction This How To Note is a guide to 802.1x and Port Authentication. It outlines the implementation of the IEEE 802.1x standard
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones Abstract The purpose of this document is to discuss 802.1X Authentication and Link Layer Discovery Protocol (LLDP) in
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
WLAN Security. Giwhan Cho [email protected]. Distributed/Mobile Computing System Lab. Chonbuk National University
WLAN Security Giwhan Cho [email protected] Distributed/Mobile Computing System Lab. Chonbuk National University Content WLAN security overview 802.11i WLAN security components pre-rsn (Robust Security
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN Daniel Schwarz Overview: 1. Introduction I. PKIX 2. Basics I. PPP II. EAP III. 802.1x IV. X.509 certificate extensions
WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS
January 2003 January WHITE 2003 PAPER WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS With the increasing deployment of 802.11 (or Wi-Fi) wireless networks in business environments, IT organizations are
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper
Bosch Security Systems Video Systems Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper 4 July 2016 Secure the edge of the network Security devices are mostly located
Configuring Wired 802.1x Authentication on Windows Server 2012
Configuring Wired 802.1x Authentication on Windows Server 2012 Johan Loos [email protected] Version 1.0 Why 802.1x Authentication? The purpose of this document is to guide you through the procedure
Wireless Networking Basics. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA
Wireless Networking Basics NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA n/a October 2005 2005 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and Auto Uplink are trademarks
Enhanced Intranet Management in a DHCP-enabled Environment
Enhanced Intranet Management in a DHCP-enabled Environment Jenq-Haur Wang and Tzao-Lin Lee Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan. E-mail:
Certified Wireless Security Professional (CWSP) Course Overview
Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Network Security: WLAN Security. Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010
Network Security: WLAN Security Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline Wireless LAN technology Threats against WLANs Weak security mechanisms and WEP 802.1X, WPA,
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Lecture 3. WPA and 802.11i
Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture
WLAN 802.11w Technology
Technical white paper WLAN 80.w Technology Table of contents Overview... Technical background... Benefits... 80.w technology implementation... Management Frame Protection negotiation... Protected management
DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland [email protected]
DESIGNING AND DEPLOYING SECURE WIRELESS LANS Karl McDermott Cisco Systems Ireland [email protected] 1 Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring
The 802.1x specification
The 802.1x specification Fulvio Risso Politecnico di Torino Based on an existing presentation of Piero Nicoletti 1 IEEE 802.1x Port-Based Network Access Control Use physical access characteristics of IEEE
Bridge Functions Consortium
Port-Based Network Access Control Technical Document Revision 2.0 University of New Hampshire 121 Technology Drive, Suite 2 Durham, NH 03824-4716 Phone: +1-603-862-3525 http://www.iol.unh.edu Fax: +1-603-862-4181
Cisco SAFE: Wireless LAN Security in Depth
White Paper Cisco SAFE: Wireless LAN Security in Depth Authors Sean Convery (CCIE #4232), Darrin Miller (CCIE #6447), and Sri Sundaralingam are the primary authors of this white paper. Mark Doering, Pej
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights
vwlan External RADIUS 802.1x Authentication
6ABSCG0002-29B July 2013 Configuration Guide vwlan External RADIUS 802.1x Authentication This configuration guide provides an in-depth look at external Remote Authentication Dial-In User Service (RADIUS)
Huawei WLAN Authentication and Encryption
Huawei WLAN Authentication and Encryption The Huawei integrated Wireless Local Area Network (WLAN) solution can provide all-round services for municipalities at various levels and enterprises and institutions
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
How To Authenticate With Port Based Authentication
Chapter 2, Port-Based Authentication Concepts Author: Jim Geier Principal Consultant, Wireless-Nets, Ltd. Email: [email protected] This chapter is a sample from the book Implementing 802.1x Security
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute
Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey
I. J. Computer Network and Information Security, 2012, 3, 31-46 Published Online April 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.03.05 Attacks Due to Flaw of Protocols Used In
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise
Michael Disabato Service Director Network & Telecom Strategies [email protected] Diana Kelley Senior Analyst Security & Risk Management Strategies [email protected] www.burtongroup.com WiFi
Chapter 10 Security Protocols of the Data Link Layer
Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2006/2007 10.1 Scope of Link Layer Security Protocols
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
802.1X Client Software
802.1X Client Software REV1.0.0 1910011339 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product
WLAN Access Security Technical White Paper. Issue 02. Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD.
WLAN Access Security Technical White Paper Issue 02 Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD. . 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by
1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.
1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6. secure data communication. The access point periodically advertise
Configure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Technical Note. CounterACT: 802.1X and Network Access Control
CounterACT: 802.1X and Contents Introduction...3 What is 802.1X?...3 Key Concepts.... 3 Protocol Operation...4 What is NAC?...4 Key Objectives.... 5 NAC Capabilities.... 5 The Role of 802.1X in NAC...6
NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
CSC574: Computer and Network Security
CSC574: Computer and Network Security Lecture 21 Prof. William Enck Spring 2016 (Derived from slides by Micah Sherr) Wireless Security Wireless makes network security much more difficult Wired: If Alice
Cipher Suites and WEP
Cipher Suites and WEP This module describes how to configure the cipher suites required for using Wireless Protected Access (WPA) and Cisco Centralized Key Management (CCKM); Wired Equivalent Privacy (WEP);
Particularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, [email protected]
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS
APPLICATION NOTE Ref APNUS004 rev. A-0, March 08, 2007 802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS Why? In addition to MAC address filtering, ACKSYS products support a more reliable authentication
IEEE 802.11 Wireless LAN Security Overview
138 IEEE 802.11 Wireless LAN Security Overview Ahmed M. Al Naamany, Ali Al Shidhani, Hadj Bourdoucen Department of Electrical and Computer Engineering Sultan Qaboos University, Oman. Summary Wireless Local
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
EAP Authentication Protocols for WLANs
C H A P T E R 7 EAP Authentication Protocols for WLANs The second in the WLAN authentication trilogy of chapters, this chapter examines the various authentication protocols such as the Extensible Authentication
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
Wireless Technology Seminar
Wireless Technology Seminar Introduction Adam Worthington Network Consultant [email protected] Wireless LAN Why? Flexible network access for your users? Guest internet access? VoWIP? RFID? Available
Wireless LAN Access Control and Authentication
Authors: John Vollbrecht, Founder Interlink Networks, Inc. 5405 Data Court, Suite 300, Ann Arbor, MI 48108, [email protected] Robert Moskowitz, Senior Technical Director TruSecure Corporation,
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 2003 Wi-Fi Alliance. Wi-Fi is a registered trademark of the Wi-Fi Alliance
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Wireless Security for Mobile Computers
A Datalogic Mobile and Summit Data Communications White Paper Original Version: June 2008 Update: March 2009 Protecting Confidential and Sensitive Information It is every retailer s nightmare: An attacker
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Wireless Local Area Network Security Obscurity Through Security
Wireless Local Area Network Security Obscurity Through Security Abstract Since the deployment of infamous Wired Equivalent Privacy (WEP), IEEE and vendors have developed a number of good security mechanisms
Wi-Fi Client Device Security and Compliance with PCI DSS
Wi-Fi Client Device Security and Compliance with PCI DSS A Summit Data Communications White Paper Original Version: June 2008 Update: January 2009 Protecting Payment Card Information It is every retailer
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles
WLAN Security.. from this... Security Architectures and Protocols in Wireless LANs (Section 3) 1 2 WLAN Security.. to this... How Security Breaches Occur 3 War (wide area roaming) Driving/War Chalking
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
802.1x in the Enterprise Network
802.1x in the Enterprise Network Harrison Forest ICTN 6823 Abstract: This paper aims to provide a general over view of 802.1x authentication and its growing importance on enterprise networks today. It
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
The Importance of Wireless Security
The Importance of Wireless Security Because of the increasing popularity of wireless networks, there is an increasing need for security. This is because unlike wired networks, wireless networks can be
Implementing Security for Wireless Networks
Implementing Security for Wireless Networks Action Items for this session Learn something! Take notes! Fill out that evaluation. I love to see your comments and we want to make these better! Most important:
User Authentication in the Enterprise Network
User Authentication in the Enterprise Network Technology for secure accessibility to Enterprise IT services 2001 Enterasys Networks, Inc. All rights reserved. Steve Hargis Technical Director Office of
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
