IEEE G / B WIRELESS SECURITY. AMX Corporation. Wireless LAN Security: T e c h n o l o g y W h i t e P a p e r

Size: px
Start display at page:

Download "IEEE G / B WIRELESS SECURITY. AMX Corporation. Wireless LAN Security: T e c h n o l o g y W h i t e P a p e r"

Transcription

1 IEEE G / B WIRELESS SECURITY AMX Corporation Wireless LAN Security: T e c h n o l o g y W h i t e P a p e r 1

2 Table of Contents Table of Contents 2 Introduction 3 Wireless LAN Market Overview 3 Components of Wireless LAN Security 4 Port Connections / RF/ Authentication 4 Wireless Security and Encryption 5 WEP 5 WPA 6 IEEE i Draft 6 2

3 Introduction Wireless LANs using IEEE technologies are globally being deployed at a phenomenal rate for business, education, government and residential purposes. Lower cost of ownership, easier deployment, and increased productivity are significant factors driving awareness of wireless networks. With wireless technologies, users are no longer tied to a desk by an Ethernet cable enabling them to access the network from virtually anywhere. With increased mobility comes increased security issues which are often not addressed, despite readily available security options available in today s products. This paper provides an overview of the wireless LAN market and addresses wireless security options available today, along with future security options in development to protect your network from intruders. Wireless LAN Market Overview According to In-Stat/MDR 5.8 million devices were sold in 2001 and growth is expected to reach 23.6 million units sold annually by Wi-Fi Units Sold World Wide 16,000,000 14,000,000 12,000,000 10,000,000 8,000,000 6,000,000 4,000,000 2,000, a (5GHz) b (2.4GHz) g (2.4GHz) Mixed Mode (2.4GHz/5GHz) Source: In-Stat/MDR, Feb

4 Companies leading the wireless market are segmented into two categories: Enterprise and Consumer. Linksys (owned by Cisco) is the leading consumer wireless LAN manufacturer with 22.3% market share followed by D-Link (17.9%), Netgear and Buffalo according to a 4 th Qtr 2004, Dell Oro Group report. Within the Enterprise category Cisco is the market leader with 36.2% market share followed by Symbol (15.5%) 3Com and Proxim. Components of Wireless LAN Security Wireless Access Points (WAPs) introduce several new networking components and vulnerabilities which need to be addressed when integrating WAPs onto the wired LAN in order to maintain a secure network. The table below provides a list of the new wireless components compared to their wired counter parts: Ethernet Wired Network 2 nd Generation Wireless Networks 1 st Generation Wireless Networks Standard a/g b Authentication 802.1x 802.1x None Security Physical Ethernet Cable WPA, LEAP WEP Connection (User/Port) Port Based (Unique) Shared (Multiple) Shared (Multiple) Max Bandwidth 10/100/1000 M 11-54Mbps 11Mbps Primary Transport Medium Coaxial, Twisted Pair RF RF Range Unlimited in a switched architecture Indoor 150ft Outdoor 1,200ft Indoor 150ft Outdoor 1,200ft Port Connections / RF/ Authentication The wired LAN network is based on physical connections i.e. a port being the equivalent of a user. Security within the physical network has traditionally been set up one a port basis. However, with a wireless LAN a port is now equal to an access point, which can host multiple users. WLAN devices use Direct Sequencing Spread Spectrum (DSSS) for their RF communications operating at either 2.4Ghz (802.11b/g) or 5.2Ghz (802.11a). As most WLAN devices are standards based, we must assume that an intruder will have access to a WLAN card that can be tuned onto the same DSSS channel, therefore, enabling the intruder to connect to an unsecured access point. As a result, enterprise IT departments are implementing authentication technology 4

5 (802.1x) based on a user s ID rather than a port. User IDs provide the key to entitling access to applications and parts of the network. Furthermore, these network access rights may vary depending on location. Thus, a WLAN user from accounting may have priority access to network bandwidth and to the SAP system while within their department. But when the user is accessing the network from a semi-public cafeteria in another building, access is limited to and instant messaging, with lower bandwidth allocations. Authentication, as defined above, is a mechanism that identifies users or services based on predefined criteria. Authentication systems range from simple name-password pairs, to more elaborate challenge-response systems, such as smart cards and biometrics. Authentication systems can prevent users from accessing the network, but they do not provide encryption, and it is not an alternative to WEP, 3DES, AES or any other encryption technology x is only focused on authentication and key management, so for complete security it must be used in combination with other encryption technologies. Wireless Security and Encryption The IEEE (Institute for Electrical and Electronics Engineers) is a non-profit organization with 360,000 members from 175 countries. Through its members, the IEEE is a leading authority in technical areas ranging from computer engineering, biomedical technology, telecommunications, electric power, aerospace and consumer electronics, among others. The members of the IEEE come from a variety of companies from industry leaders to start-ups all with the mission to share technical knowledge and develop industry standards for all companies to use and incorporate into their products. Through the IEEE the standard for wireless communications was developed. Through additional task groups subsequent standards were developed to integrate international conformity, quality of service, roaming, greater throughput, and security. The IEEE s wireless security task group developed WEP as a part of the original standard. WEP When it comes to wireless security, the IEEE s first attempt was WEP (Wired Equivalent Privacy). The standard was developed to protect over-the-air transmissions between WLAN access points (WAPs) and network interface cards (clients). Working at the data link layer, WEP requires that the same secret key (WEP Key) be exchanged between the WAP and client in order for the WAP to allow the client to access the network. The WEP keys were used to authenticate the user to the network. The IEEE provided the standard for the RC4 encryption algorithm along with the key format, but did not provide a mechanism for dynamic key management. In the standard, a small 24-bit plaintext (unencrypted) message is placed in the header of each message. Within this header it provides a range of 16,777,216 possible values, which can be used to by an intruder to decipher the WEP encryption and gain access to the network. As a result, the IEEE and the Wi-Fi Alliance have developed new standards to overcome WEP s vulnerability. The WEP protocol does provide basic wireless authentication and encryption and is sufficient for most home and small-business users to protect their wireless networks. However, for larger 5

6 businesses more sophisticated encryption and key management protocols can be implemented to protect your network. WPA WPA (Wi-Fi Protected Access) was developed by the Wi-Fi Alliance in conjunction with the IEEE i task group in order to provide a wireless security solution to overcome WEPs vulnerability. The Wi-Fi Alliance is a non-profit organization formed in 1999 to certify interoperability of IEEE products and promote Wi-Fi as the global, wireless LAN standard across all market segments. Over 700 products have been Wi-Fi certified by the Wi-Fi Alliance. WPA is designed for use with an 802.1x authentication server. As mentioned previously, the authentication is responsible for authorizing a user to connect to the network. In addition, the authentication server will provide the keys for both the WAP and the Client to use during each communication session. However, if an organization doesn t have an authentication server, the Wi-Fi Protected Access has a less secure pre-shared key (PSK) mode. In the PSK mode the WAP is responsible for authentication and key distribution. One major improvement over WEP is provided by the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used. With WEP, the keys remained the same and didn t change. With TKIP they change with every 10,000 bits of information being transmitted. The number of possible values has also increased from 16 million to 5 trillion. This combination of dynamically changing the keys and increasing the total possible values has made WPA a strong security solution and that resolves the security issues with WEP. WPA was finalized in October, 2002 with the first products launched in May, Since the commercial launch in 2003, WPA remains a solid security solution. IEEE i Draft IEEE i Draft incorporates the same technology improvements in authentication and key management found in WPA, but improves encryption i incorporates the Advanced Encryption Standard (AES) which requires hardware changes in both the Wireless Access Point and Wireless Network Interface Cards in order to process the more complex computational load of AES. With AES the entire data frame is encrypted, not just the data payload used in RC4 for WEP and WPA. The IEEE i draft is expected to be finalized by June, 2004 with associated products being launched in the 4th Quarter of

7 2004 AMX Corporation 3000 Research Drive Richardson Texas, Phone

TJX used WEP security They lost 45 million customer records They settled the lawsuits for $40.9 million. Dang Thanh Binh

TJX used WEP security They lost 45 million customer records They settled the lawsuits for $40.9 million. Dang Thanh Binh Describe the basic IEEE 802.11 wireless security protections Define the vulnerabilities of open system authentication, WEP, and device authentication Describe the WPA and WPA2 personal security models

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Objectives Describe the different types of wireless network attacks List the vulnerabilities in IEEE 802.11 security Explain the solutions for securing a wireless network 2 Introduction

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 8 Wireless Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 8 Wireless Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 8 Wireless Network Security Objectives Describe the different types of wireless network attacks List the vulnerabilities in IEEE

More information

Implementing Wireless LAN Security

Implementing Wireless LAN Security Implementing Wireless LAN Security Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal security model List the components that make

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

White Paper. Wireless LAN Security. Copyright Madge Limited. All rights reserved.

White Paper. Wireless LAN Security. Copyright Madge Limited. All rights reserved. White Paper Wireless LAN Security Copyright 2002-2003 Madge Limited. All rights reserved. 1 Introduction As wireless LANs become widely deployed, and the business benefits become clear, concern has grown

More information

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 2003 Wi-Fi Alliance. Wi-Fi is a registered trademark of the Wi-Fi Alliance

More information

WLAN security. Contents

WLAN security. Contents Contents WEP (Wired Equivalent Privacy) No key management Authentication methods Encryption and integrity checking WPA (WiFi Protected Access) IEEE 802.1X authentication framework Practical example using

More information

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key

More information

Configuring WEP and WEP Features

Configuring WEP and WEP Features CHAPTER 9 This chapter describes how to configure Wired Equivalent Privacy (WEP), Message Integrity Check (MIC), and Temporal Key Integrity Protocol (TKIP). This chapter contains these sections: Understanding

More information

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61) (11) 4062-6971 (21) 4062-6971 (31) 4062-6971 (41) 4062-6971 (48) 4062-6971 (51) 4062-6971 (61) 4062-6971 Cisco WAP200E Wireless-G Exterior Access Point: PoE Cisco Small Business Access Points High-Speed

More information

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2

More information

Table of Contents 1 WLAN Security 1-1

Table of Contents 1 WLAN Security 1-1 Table of Contents 1 WLAN Security 1-1 Overview 1-1 Authentication Modes 1-1 WLAN Data Security 1-2 Client Access Authentication 1-3 WLAN Security Policies 1-5 i 1 WLAN Security Overview WLAN networks feature

More information

Objectives. Introducing Wireless Security

Objectives. Introducing Wireless Security Introducing Wireless Security Objectives Describe the need for WLAN security. Describe the evolution of WLAN security methods. Identify common authentication and encryption technologies used in WLANs.

More information

Cipher Suites and WEP

Cipher Suites and WEP Cipher Suites and WEP This document describes how to configure Wired Equivalent Privacy (WEP), Message Integrity Check (MIC), Temporal Key Integrity Protocol (TKIP), and Advanced Encryption Standard (AES).

More information

WLAN Authentication and Data Privacy

WLAN Authentication and Data Privacy WLAN Authentication and Data Privacy Digi Wi-Point 3G supports various Wi-Fi security options, including WEP-40/WEP-104 and WPA- PSK and WPA2-PSK. To configure WLAN security on DIGI WI-POINT 3G, you may

More information

Hardware Capabilities. Product Brief: SDC-PE15N n PCIe Module with Antenna Connectors

Hardware Capabilities. Product Brief: SDC-PE15N n PCIe Module with Antenna Connectors Product Brief: SDC-PE15N 802.11n PCIe Module with Antenna Connectors The SDC-PE15N PCI Express Mini Card (PCIe) radio module from Summit Data Communications combines a high-performance, dual-band 802.11n

More information

Introduction to Wireless Networking

Introduction to Wireless Networking Introduction to Wireless Networking Module-2 Wireless Local Area Networking Clients and WLAN Devices CCRI ENGINEERING AND TECHNOLOGY Jerry Bernardini 1 CCRI Engineering and Technology Jbernardini 1 REFERENCES

More information

Connection / Activity LED

Connection / Activity LED T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Configure Workgroup Bridge on the WAP351

Configure Workgroup Bridge on the WAP351 Article ID: 5047 Configure Workgroup Bridge on the WAP351 Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless LAN that

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

We can see a growing interest for wireless implementations in various vertical markets i.e. retail, manufacturing, health-care and education.

We can see a growing interest for wireless implementations in various vertical markets i.e. retail, manufacturing, health-care and education. Wireless LAN When deploying a data and/or speech network in the enterprise there are various implementation-possibilities, more and more we see a growing interest and demand in the combined wired and wireless

More information

Wireless LAN Security and Analysis

Wireless LAN Security and Analysis Wireless LAN Security and Analysis Duration: 5 Days Course Code: GK3607 Overview: Tackle Wireless LAN security in this course that teaches the essential concepts and protocols from the inside out. Learn

More information

A CompuCom Perspective - Wireless LAN Security:

A CompuCom Perspective - Wireless LAN Security: A CompuCom Perspective - Wireless LAN Security: A White Paper Prepared by CompuCom s ConvergeMobile and Security Practices September 2003 Introduction... 2 Benefits of Wireless LANs... 2 Productivity...

More information

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia

More information

Digital forensics. Wireless Network Forensics Unplugged. ALNAZIF NOHAMMED

Digital forensics. Wireless Network Forensics Unplugged. ALNAZIF NOHAMMED Digital forensics Wireless Network Forensics Unplugged ALNAZIF NOHAMMED alnadeef@yahoo.com Topics The IEEE Layer 2 Protocol Series. Wireless Access Points (WAPs). Wireless Traffic Capture and Analysis.

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

Network Security Best Practices

Network Security Best Practices CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual

More information

Project report On WIRELESS NETWORKING. Prepared by ASHISH KUMAR SAHU. Project guide MR. SAKET DIXIT

Project report On WIRELESS NETWORKING. Prepared by ASHISH KUMAR SAHU. Project guide MR. SAKET DIXIT Project report On WIRELESS NETWORKING Prepared by ASHISH KUMAR SAHU Project guide MR. SAKET DIXIT Certificate This is to certify that ASHISH KUMAR SAHU Has completed project on WIRELESS NETWORKING Successfully

More information

54Mbps Wireless USB Adapter User Guide

54Mbps Wireless USB Adapter User Guide 54Mbps Wireless USB Adapter User Guide DYWUK54 DYWUK54 54Mbps Wireless USB Adapter User Guide Package Contents... 3 Chapter 1: Introduction... 4 1.1 Overview of the product... 4 1.2 Features... 4 1.3 LED

More information

Cisco 521 Wireless Express Access Point

Cisco 521 Wireless Express Access Point Cisco 521 Wireless Express Access Point The Cisco 521 Wireless Express Access Point is a single-band 802.11g access point that features business-class management, security, and scalability. This access

More information

Auditing Wireless Networks

Auditing Wireless Networks Information Systems Audit & Control Association Auditing Wireless Networks Presented by: Deloitte & Touche May 2005 Agenda Overview of Wireless Technology Radio Frequency Spectrum Wireless Standards &

More information

Wi Fi Protected Access 2 (WPA 2) Configuration Example

Wi Fi Protected Access 2 (WPA 2) Configuration Example Wi Fi Protected Access 2 (WPA 2) Configuration Example Document ID: 67134 Introduction Prerequisites Requirements Components Used Conventions Background Information WPA 2 Support with Cisco Aironet Equipment

More information

Wi Fi Protected Access (WPA) in a Cisco Unified Wireless Network Configuration Example

Wi Fi Protected Access (WPA) in a Cisco Unified Wireless Network Configuration Example Wi Fi Protected Access (WPA) in a Cisco Unified Wireless Network Configuration Example Document ID: 100708 Contents Introduction Prerequisites Requirements Components Used Conventions WPA and WPA2 Support

More information

Our ALINK-8110 & APRO-8110 WiFi Mesh Metropolitan Area Network solution extends the capability of WiFi Local

Our ALINK-8110 & APRO-8110 WiFi Mesh Metropolitan Area Network solution extends the capability of WiFi Local Outdoor Wi-Fi Mesh System ALINK-8110 & APRO-8110 Our ALINK-8110 & APRO-8110 WiFi Mesh Metropolitan Area Network solution extends the capability of WiFi Local Area Network technologies (IEEE802.11) from

More information

Chapter 2 Introduction

Chapter 2 Introduction Chapter 2 Introduction This chapter introduces the NETGEAR WG102 ProSafe 802.11g Wireless Access Point. Minimal requirements for installation are in System Requirements on page 2-5. About the NETGEAR WG102

More information

Wireless LAN Security

Wireless LAN Security Wireless LAN Security Chris Johnson CSE - Cisco Federal chrisj@cisco.com - 703 484 5661 Course Number Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 1 Agenda 802.11 Standards WLAN Security

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings For a wireless connection, the SSID, also called the wireless network name, and the wireless security setting must be the same for the

More information

Issues in Wireless Security (WEP, WPA & i)

Issues in Wireless Security (WEP, WPA & i) Issues in Wireless Security (WEP, WPA & 802.11i) Presented to the 18 th Annual Computer Security Applications Conference 11 December 2002 Brian R. Miller, Booz Allen Hamilton 0 Overview Examine current

More information

W541U Wireless USB Adapter User Guide

W541U Wireless USB Adapter User Guide -- 1 -- Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective

More information

Wireless Print Server with 3G Mobile Video. Wireless G USB 2.0 Adapter

Wireless Print Server with 3G Mobile Video. Wireless G USB 2.0 Adapter Wireless G USB 2.0 Adapter Wireless Print Server with 3G Mobile Video System Requirements 10/100 Fast Ethernet Wired or 802.11b/g Wireless Network Printer with USB Port* Computer with: Windows XP (SP2)

More information

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS Jose Perez Texas A&M University Corpus Christi Email: jluisperez16@gmail.com Fax Number: (361) 825-2795 Faculty Advisor: Dr. Ahmed Mahdy, Texas A&M University

More information

Enterprise Wireless Networking

Enterprise Wireless Networking Networking Allied Telesis high specification wireless access points cater for the growing needs of today s wireless-enabled networks. Our solutions address the security concerns of wireless networks, using

More information

Wireless LAN Security Mechanisms

Wireless LAN Security Mechanisms Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group jingan.xu@tu-ilmenau.de, mitsch@tu-ilmenau.de Abstract.

More information

Cisco Aironet 5 GHz 54 Mbps Wireless LAN Client Adapter (CB20A)

Cisco Aironet 5 GHz 54 Mbps Wireless LAN Client Adapter (CB20A) Cisco Aironet 5 GHz 54 Mbps Wireless LAN Client Adapter (CB20A) The Cisco Aironet 5 GHz 54 Mbps Wireless LAN client adapter is an Institute of Electrical and Electronic Engineers (IEEE) 802.11a-compliant

More information

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas.

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas. Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key

More information

WLAN solutions for HP enterprise notebooks and Tablet PCs

WLAN solutions for HP enterprise notebooks and Tablet PCs WLAN solutions for HP enterprise notebooks and Tablet PCs 2510p, 2710p, 6510b, 6515b, 6710s, 6710b, 6715s, 6715b, 6910p, 8510p, 8510w, 8710p, 8710w PCs Executive summary... 2 Introduction... 2 Enterprise

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,

More information

Configure WorkGroup Bridge on the WAP131 Access Point

Configure WorkGroup Bridge on the WAP131 Access Point Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless

More information

Configuration Manual Configuration Notes for Cisco 1200 Series AP in Ascom VoWiFi System

Configuration Manual Configuration Notes for Cisco 1200 Series AP in Ascom VoWiFi System Configuration Manual Configuration Notes for Cisco 1200 Series AP in Ascom VoWiFi System Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 AP Configuration... 2 2.1 Radio Settings... 2

More information

WIRELESS USB ADAPTER OVERVIEW...

WIRELESS USB ADAPTER OVERVIEW... Contents 1.0 WELCOME... 2 2.0 PACKAGE CONTENTS... 3 3.0 WIRELESS USB ADAPTER OVERVIEW... 4 4.0 WIRELESS USB ADAPTER INSTALLATION... 5 4.1 WINDOWS 7... 5 4.2 WINDOWS XP... 9 5.0 MAKING A BASIC WIRELESS

More information

Wireless LAN Security. Indira Mohandoss Monica González

Wireless LAN Security. Indira Mohandoss Monica González Wireless LAN Security Indira Mohandoss Monica González Outline Introduction Benefits of WLAN Common threats Methods to secure WLANs Comparison of methods Conclusion What is a WLAN? Also, referred to as

More information

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how

More information

Hands-On WiFi Networks & WiFi Hotspot

Hands-On WiFi Networks & WiFi Hotspot Hands-On Design & Support Course Description This class provides a complete foundation of knowledge for the Wi-Fi networking industry. From basic RF theory to 802.11 frame exchange processes. This course

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with RangeBooster User Guide Model No. WMP54GR Copyright and Trademarks Specifications are subject to change without notice.

More information

Cisco Aironet 1130G Series IEEE 802.11g Access Point

Cisco Aironet 1130G Series IEEE 802.11g Access Point Cisco Aironet 1130G Series IEEE 802.11g Access Point Low-profile business-class access point with integrated antennas for easy deployment in offices and similar RF environments Product Overview The Cisco

More information

Authentication in WLAN

Authentication in WLAN Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

Cisco Aironet 1130G Series IEEE g Access Point

Cisco Aironet 1130G Series IEEE g Access Point Cisco Aironet 1130G Series IEEE 802.11g Access Point Low-profile business-class access point with integrated antennas for easy deployment in offices and similar RF environments Product Overview The Cisco

More information

Centralized wireless local area networks. Centralized Wireless LAN: Thin vs. Fat Technology. WLAN Architecture Overviews.

Centralized wireless local area networks. Centralized Wireless LAN: Thin vs. Fat Technology. WLAN Architecture Overviews. Centralized Wireless LAN: Thin vs. Fat Technology By Jeff Davis 14 Centralized wireless local area networks (LANs) are quickly becoming the preferred deployment architecture among organizations looking

More information

Cisco WAP200 Wireless-G Access Point: PoE/RangeBooster. Cisco Small Business Access Points

Cisco WAP200 Wireless-G Access Point: PoE/RangeBooster. Cisco Small Business Access Points Cisco WAP200 Wireless-G Access Point: PoE/RangeBooster Cisco Small Business Access Points Wireless Access Point That Extends Network Connectivity for Small Businesses Highlights Increases wireless throughput

More information

Technology in Schools

Technology in Schools Technology in Schools Recommended Specifications for School Wireless LAN Systems Version 2.2 May 2015 Table of contents Technology in Schools... 1 1 INTRODUCTION... 3 1.1 Instructions... 3 2 SYSTEM OVERVIEW...

More information

Wi Fi Protected Access 2 (WPA 2) Configuration Example

Wi Fi Protected Access 2 (WPA 2) Configuration Example Wi Fi Protected Access 2 (WPA 2) Configuration Example Document ID: 67134 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information WPA 2 Support with Cisco Aironet

More information

WL-700G-M G Wireless USB Adapter User Guide -1-

WL-700G-M G Wireless USB Adapter User Guide -1- -1- Table of Content Chapter 1 Introduction... 1 1.1 Product Feature... 1 1.2 Product Deployment... 2 1.3 Indicator Description... 3 1.4 Package Contents... 4 Chapter 2 Installation Guide... 5 Chapter

More information

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61) (11) 4062-6971 (21) 4062-6971 (31) 4062-6971 (41) 4062-6971 (48) 4062-6971 (51) 4062-6971 (61) 4062-6971 Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without

More information

Configuring Cipher Suites and WEP

Configuring Cipher Suites and WEP CHAPTER 9 This chapter describes how to configure the cipher suites required to use WPA and CCKM authenticated key management, Wired Equivalent Privacy (WEP), WEP features including AES, Message Integrity

More information

Wireless Networking. WLAN Security Continued Module-9

Wireless Networking. WLAN Security Continued Module-9 Wireless Networking WLAN Security Continued Module-9 Jerry Bernardini Community College of Rhode Island 3/28/2012 Wireless Networking J. Bernardini 1 Presentation Reference Material CWTS Certified Wireless

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

WIRELESS NETWORKING i

WIRELESS NETWORKING i WIRELESS NETWORKING i Overview of wireless technologies The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols, but without

More information

Long Range Wireless Access Point / Client Bridge

Long Range Wireless Access Point / Client Bridge EOC-2610 is a long range outdoor wireless that operates seamlessly in the frequency spectrum and provides high bandwidth up to 108Mbps with Super G. It features high transmitted output power and high receivable

More information

802.11b+g Wireless USB Adapter

802.11b+g Wireless USB Adapter 802.11b+g Wireless USB Adapter User s Manual www.unicomlink.com pn: WEP-45020G UNIDOC111904 REGULATORY STATEMENTS FCC Certification The United States Federal Communication Commission (FCC) and the Canadian

More information

Cisco WAP200E Wireless-G Exterior Access Point: PoE Cisco Small Business Access Points

Cisco WAP200E Wireless-G Exterior Access Point: PoE Cisco Small Business Access Points Cisco WAP200E Wireless-G Exterior Access Point: PoE Cisco Small Business Access Points High-Speed Wireless Access for Exterior Environments Highlights Extends network to exterior business environments,

More information

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) En Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) Mac OS X Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Mac OS X (10.5.2)

More information

Configuration Notes Cisco WLC Infrastructure in Ascom VoWiFi System

Configuration Notes Cisco WLC Infrastructure in Ascom VoWiFi System Configuration Notes Cisco WLC Infrastructure in Ascom VoWiFi System Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 Configuration... 2 2.1 Radio Settings... 2 2.2 Quality of Service

More information

Wireless Troubleshooting

Wireless Troubleshooting Wireless Troubleshooting Applicable Version: 10.00 onwards Applicable Models: All WiFi Models - CR15wi, CR15wiNG, CR25wi, CR25wiNG, CR35wi, CR35wiNG Connectivity Issues with Cyberoam Inbuilt Access points

More information

Certified Wireless Security Professional (CWSP) Course 01 - WLAN Security Overview

Certified Wireless Security Professional (CWSP) Course 01 - WLAN Security Overview Certified Wireless Security Professional (CWSP) Course 01 - WLAN Security Overview Slide 1 Course 01 WLAN Security Overview Slide 2 Course Overview Where We Came From Standards Organizations ISO and the

More information

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop

More information

Cisco Aironet 1130AG Series IEEE A/B/G Access Point

Cisco Aironet 1130AG Series IEEE A/B/G Access Point Data Sheet Cisco Aironet 1130AG Series IEEE 802.11A/B/G Access Point Low-profile enterprise-class access point with integrated antennas for easy deployment in offices and similar RF environments. PRODUCT

More information

ASRock WiFi n Module. Operation Guide

ASRock WiFi n Module. Operation Guide ASRock WiFi-802.11n Module Operation Guide 1 1. Introduction ASRock WiFi-802.11n module is an easy-to-use wireless local area network (WLAN) adapter to support WiFi+AP function. With ASRock WiFi-802.11n

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

Wireless Security Threats and Countermeasures

Wireless Security Threats and Countermeasures Wireless Security Threats and Countermeasures Wireless and Optical Communications Conference 2007 Steve Wang Distinguished Member of Technical Staff Alcatel-Lucent Lilse, IL 60532 April 2007 All Rights

More information

Wireless Security. OWASP 22 nd September The OWASP Foundation

Wireless Security. OWASP 22 nd September The OWASP Foundation Wireless Security 22 nd September 2008 Sheetal Joseph CISSP, CEH Tech Mahindra sheetalj@techmahindra.com Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under

More information

1.0 INTRODUCTION PACKAGE CONTENTS WIRELESS USB ADAPTER OVERVIEW WIRELESS USB ADAPTER INSTALLATION WINDOWS 7...

1.0 INTRODUCTION PACKAGE CONTENTS WIRELESS USB ADAPTER OVERVIEW WIRELESS USB ADAPTER INSTALLATION WINDOWS 7... Contents 1.0 INTRODUCTION... 2 2.0 PACKAGE CONTENTS... 3 3.0 WIRELESS USB ADAPTER OVERVIEW... 4 4.0 WIRELESS USB ADAPTER INSTALLATION... 5 4.1 WINDOWS 7... 5 4.2 WINDOWS XP... 9 5.0 MAKING A BASIC WIRELESS

More information

3112 M Street NW Washington, DC Paul Innella, CISSP

3112 M Street NW Washington, DC Paul Innella, CISSP 3112 M Street NW Washington, DC 20007 202.337.5600 www.tdisecurity.com Paul Innella, CISSP PaulInnella@TDISecurity.com WPANs Definition: Alternate Definition: Short distance wireless networks. A computer

More information

FIPS 140-2, IEEE i and WPA2 In 3eTI Wireless Products

FIPS 140-2, IEEE i and WPA2 In 3eTI Wireless Products FIPS 140-2, IEEE 802.11i and WPA2 In 3eTI Wireless Products R. K. Coleman 3e Technologies International, Inc. 9715 Key West Avenue, Fifth Floor Rockville, MD 20850 Abstract IEEE 802.11i goes beyond the

More information

Configuring a WLAN for Static WEP

Configuring a WLAN for Static WEP Restrictions for Configuring Static WEP, page 1 Information About WLAN for Static WEP, page 1 Configuring WPA1+WPA2, page 3 Restrictions for Configuring Static WEP The OEAP 600 series does not support

More information

ANALYSIS OF VARIOUS SECURITY ISSUES IN CLOUD COMPUTING USING WLAN PROTOCOLS

ANALYSIS OF VARIOUS SECURITY ISSUES IN CLOUD COMPUTING USING WLAN PROTOCOLS ANALYSIS OF VARIOUS SECURITY ISSUES IN CLOUD COMPUTING USING WLAN PROTOCOLS Arleen Kaur, Monika Aggarwal Bhai Gurudas Institute of Engineering and Technology Sangrur, Punjab, India Abstract As Wireless

More information

Intel Building Blocks for Wireless LAN Security

Intel Building Blocks for Wireless LAN Security White Paper Intel Building Blocks for Wireless LAN Security February 2003 Intel in Communications Contents Introduction 1 Wireless LAN Security Issues 1 Known 802.11 Security Vulnerabilities 1 Virtual

More information

Huawei WLAN Authentication and Encryption

Huawei WLAN Authentication and Encryption Huawei WLAN Authentication and Encryption The Huawei integrated Wireless Local Area Network (WLAN) solution can provide all-round services for municipalities at various levels and enterprises and institutions

More information

Configuration Notes Motorola WLAN Infrastructure in Ascom VoWiFi System

Configuration Notes Motorola WLAN Infrastructure in Ascom VoWiFi System Configuration Notes Motorola WLAN Infrastructure in Ascom VoWiFi System Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 Configuration... 2 2.1 Radio Settings... 2 2.2 Quality of Service

More information

COMPARISON OF VARIOUS WLAN SECURITIES

COMPARISON OF VARIOUS WLAN SECURITIES COMPARISON OF VARIOUS WLAN SECURITIES SHIKHA BANSAL, MANISH MAHAJAN CGC, Landran, Punjab Abstract As Wireless Local Area Networks (WLANs) are rapidly deployed to expand the field of wireless products,

More information

WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies

WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2010 AirTight Networks, Inc. All rights reserved. Executive Summary A Wi-Fi Protected

More information

802.11n Wireless USB Dongle USER MANUAL 2.0

802.11n Wireless USB Dongle USER MANUAL 2.0 802.11n Wireless USB Dongle USER MANUAL 2.0 2012 Contents 1. Introduction...3 2. Driver Installation...4 2.1 Windows 7...4 3. Wireless Network Configuration...7 3.1 Utility Icon...7 3.2 Client Mode...7

More information

Wireless Networks: Basics & Security Issues

Wireless Networks: Basics & Security Issues Wireless Networks: Basics & Security Issues Burak Ekici ekcburak@hotmail.com Department of Computer Engineering, Yaşar University, Turkey. April 22, 2012 Burak Ekici (Dept. of Comp. Eng.) Wireless Networks:

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information