WLAN Security: Configuring WLAN Security Options

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "WLAN Security: Configuring WLAN Security Options"

Transcription

1 WLAN Security: Configuring WLAN Security Options 2010 Cisco Systems, Inc. All rights reserved. CUWN v Lesson Overview & Objectives Overview This lesson discusses the considerations and options for configuring security options appropriate for a various Cisco Unified Wireless Network deployments. Objectives Upon completing this lesson, you will be able to configure various security options for a WLAN solution that are appropriate for a specific deployment. This ability includes being able to meet these objectives: Identify considerations for weak security policies Describe Open Authentication and its issues List the benefits and downfalls of SSID Hiding Explain the purpose and configuration of Pre-Shared Key Authentication for Static WEP Describe Web Authentication 2010 Cisco Systems, Inc. All rights reserved. CUWN v

2 Weak Security Policies Open authentication (none) SSID Hiding Pre-shared key authentication (static WEP) Web Authentication 2010 Cisco Systems, Inc. All rights reserved. CUWN v Open Authentication No Security WLAN protocol defined in the specification. IEEE compliant WLAN client will use open authentication by default. Operates at Layers 1 and 2 and does not offer end-to-end security. Implied method of association since user authentication should be applied to provide security. WEP keys do not play a part in authentication. Authentication Request Authentication Association Request Association Data 2010 Cisco Systems, Inc. All rights reserved. CUWN v

3 Issues with Open Authentication No encryption, per-packet authentication or message integrity check. Does not protect against interception, hijacking, or packet modification. Client can authenticate based solely on having the right SSID. MAC filtering may be applied but this is still minimal security Cisco Systems, Inc. All rights reserved. CUWN v SSID Hiding SSID not included in AP beacons. Client must know the SSID cannot find it in the list of wireless networks. Wireless sniffers can pick up other packets from clients already on the WLAN; or can cause a client to de-associate and re-associate; and can determine the SSID from those packets Cisco Systems, Inc. All rights reserved. CUWN v

4 Pre-Shared Key Authentication Static WEP WLAN security protocol defined in the specification. Operates at Layers 1 and 2 and does not offer end-to-end security. Uses key plus Initialization Vector (IV). IV is a random number generated through the WEP algorithm. Only the key is used in encryption of the data. Three user-specified key lengths. 40-bit key. Combined with IV to yield 64 bits. 104-bit key. Combined with IV to yield 128 bits. 128-bit key. Combined with IV to yield 152 bits. Cisco wireless supports pre-shared key authentication. 40-bit or 104-bit keys supported. Disabled by default Cisco Systems, Inc. All rights reserved. CUWN v Pre-Shared Key Authentication Static WEP (Cont.) Same steps as open authentication with following additions: Requires a WEP key to be placed on the client and AP. Challenge phrase is sent in the clear from AP to client. Client uses WEP key to encrypt the challenge phrase and returns to AP. Authentication Request Challenge Phrase Encrypted Response Authentication Association Request Association Data 2010 Cisco Systems, Inc. All rights reserved. CUWN v

5 Pre-Shared Key Authentication Static WEP Issues No per-packet authentication or message integrity check. Hackers can easily obtain challenge phrase and encrypted response, and then: Crack the WEP key. Correctly decrypt captured data traffic. Weak encryption of data. Repeating IV can provide insight into cracking WEP key. Each client and AP must be configured with matching WEP key. Managing keys can be difficult in an enterprise WLAN. Less secure than using open Layer 2 association and then applying user authentication with dynamic encryption method Cisco Systems, Inc. All rights reserved. CUWN v Configuring Static WEP 1. From the WLAN configuration screen, click Security > Layer 2 tabs. 2. From the drop-down box, select Static WEP. The screen will refresh and show the new options. 3. In the WEP Parameters options, select the key size, the key index, and the key format. 4. Type the desired WEP key into the Encryption Key textbox Cisco Systems, Inc. All rights reserved. CUWN v

6 Web Authentication Allows users to authenticate through a web browser interface. Clients who attempt to access the WLAN using HTTP are automatically directed to a login page. Login page is customizable for logos and text. Maximum number of Local Web Authentication Users is Generally used for guest access. The Web Authentication page on the controller is customizable; or the user can be directed to another URL for a customized page Cisco Systems, Inc. All rights reserved. CUWN v Web Authentication Process Open Authentication Association DHCP Request Supplicant or Client DHCP Reply DNS Request DNS Redirect TLS Hello TLS Certificate TLS Negotiation Done Credential Request Credential Response DNS Response Data DNS Response Local or RADIUS AAA DHCP / DNS / RADIUS Server The controller uses the virtual interface address for communication to the client Cisco Systems, Inc. All rights reserved. CUWN v

7 2010 Cisco Systems, Inc. All rights reserved. CUWN v Web Authentication Issues No encryption, per-packet authentication, or message integrity check Should use some other security mechanism after authentication Does not protect against interception, hijacking, or packet modification Supported only with these Layer 2 security policies: open authentication open authentication+wep WPA-PSK Not supported for use with 802.1X 2010 Cisco Systems, Inc. All rights reserved. CUWN v

8 Configuring Web Authentication 1. From the WLAN configuration screen, click on the Security > Layer 3 tabs. 2. At the Web Policy checkbox, ensure that Authentication is selected Cisco Systems, Inc. All rights reserved. CUWN v Cisco Systems, Inc. All rights reserved. CUWN v

9 Web Authentication Page Configuration Go to Security > Web Auth > Web Login Page to configure and customize the login page for Web Authentication. Standard HTML tags can be used to customize the headline and message Cisco Systems, Inc. All rights reserved. CUWN v Web Authentication Page Configuration (Cont.) Default Login Page Customized Login Page (based on the previous slide s configurations and a custom logo uploaded to the controller) 2010 Cisco Systems, Inc. All rights reserved. CUWN v

10 Web Authentication Certificate The Controller can present a third-party certificate by downloading an SSL certificate, but the default is a self-signed certificate. For HTTPS web authentication sessions Cisco Systems, Inc. All rights reserved. CUWN v External Web Authentication Redirecting to an External Server 1. In the Web Authentication Type drop-down box, select External (Redirect to external server). 2. In the External Web Auth URL text box, type the URL to the external server authentication page. 3. In the Web Server IP Address text box, type the IP address of the external web server Cisco Systems, Inc. All rights reserved. CUWN v

11 External Web Authentication Creating a Pre-authentication ACL A pre-authentication ACL needs to be configured to allow the WLAN client to have access to the remote server for authentication. 1. Go to Security > Access Control Lists and create a new ACL. 2. Give the new ACL a name and click Apply Cisco Systems, Inc. All rights reserved. CUWN v External Web Authentication Creating a Pre-Authentication ACL Rule 1. After the new ACL has been created, select the new ACL. 2. Click Add New Rule. 3. Create a rule that allows HTTP access to the IP address of the remote web server Cisco Systems, Inc. All rights reserved. CUWN v

12 External Web Authentication Applying a Pre-Authentication ACL to a WLAN 1. In WLAN configuration mode, choose Security > Layer 3 tabs. 2. In the drop-down box for Preauthentication ACL, select the new ACL Cisco Systems, Inc. All rights reserved. CUWN v Assigning Web Authentication Type per WLAN A different Web Authentication type can be specified for each WLAN Cisco Systems, Inc. All rights reserved. CUWN v

13 Lesson Summary Weak security policies in a Cisco Unified Wireless Network environment allow easy access with minimal client-side configuration. Key security issues need to be considered before configuring Open Authentication. SSID Hiding has both benefits and downfalls for clients. WEP uses a pre-shared key to encrypt traffic to and from the client. Web Authentication is a method of verifying users through a web browser interface Cisco Systems, Inc. All rights reserved. CUWN v Cisco 2010 Cisco Systems, Inc. All rights reserved. CUWN v

Wireless LAN Controller Web Authentication Configuration Example

Wireless LAN Controller Web Authentication Configuration Example Wireless LAN Controller Web Authentication Configuration Example Document ID: 69340 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Web Authentication Process

More information

Configure Workgroup Bridge on the WAP351

Configure Workgroup Bridge on the WAP351 Article ID: 5047 Configure Workgroup Bridge on the WAP351 Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless LAN that

More information

Chapter 5 Advanced Wireless Bridging

Chapter 5 Advanced Wireless Bridging Chapter 5 Advanced Wireless Bridging This chapter describes how to configure the advanced features of your WN802T v2 to one of six access point bridge mode profiles, or in Wireless Bridge and Repeater

More information

Configure WorkGroup Bridge on the WAP131 Access Point

Configure WorkGroup Bridge on the WAP131 Access Point Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless

More information

WLAN Security: Identifying Client and AP Security

WLAN Security: Identifying Client and AP Security WLAN Security: Identifying Client and AP Security 2010 Cisco Systems, Inc. All rights reserved. CUWN v7.0 4-1 Lesson Overview & Objectives Overview This lesson provides detailed discussions on the Cisco

More information

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis: IMPORTANT! This Guide refers to the following Products: Securing Your Wireless Network Please read the following carefully; Synopsis: This Guide is designed to help you if you have a Wireless Network that

More information

Configuration of Cisco Autonomous Access Point with 802.1x Authentication for Avaya 3631 Wireless Telephone

Configuration of Cisco Autonomous Access Point with 802.1x Authentication for Avaya 3631 Wireless Telephone Configuration of Cisco Autonomous Access Point with 802.1x Authentication for Avaya 3631 Wireless Telephone Product Summary Manufacturer: Cisco Systems: www.cisco.com Access Point: Cisco Aironet 1130AG

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...

More information

Network Connections and Wireless Security

Network Connections and Wireless Security Network Connections and Wireless Security This chapter explains how to use your Wireless Adapter to connect to your Wireless Local Area Network (WLAN) and how to set up wireless security for the Wireless

More information

Hotspot Manager. Configuration guide for Cisco WLC. ADIPSYS SAS 2405 route des Dolines 06560 Valbonne Sophia-Antipolis

Hotspot Manager. Configuration guide for Cisco WLC. ADIPSYS SAS 2405 route des Dolines 06560 Valbonne Sophia-Antipolis Hotspot Manager Configuration guide for Cisco WLC ADIPSYS SAS 2405 route des Dolines 06560 Valbonne Sophia-Antipolis http://www.adipsys.com Copyright @ ADIPSYS - 2016 Configuration guide for Cisco WLC

More information

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

Quick Start Guide for Zone Director Controller

Quick Start Guide for Zone Director Controller Quick Start Guide for Zone Director Controller Version 1.0 Copyright 2012, Wifi-Soft Solutions All rights reserved. Purpose of this document 1. This document should be used in conjunction with Zone Director

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

Scenario: IPsec Remote-Access VPN Configuration

Scenario: IPsec Remote-Access VPN Configuration CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create

More information

Aruba Instant IAP Setup Notes June 2012 Version 3

Aruba Instant IAP Setup Notes June 2012 Version 3 Aruba Instant IAP Setup Notes June 2012 Version 3 Aruba Instant (or IAP) is a simple to deploy turn-key WLAN solution consisting of one or more access points. As long as you have an Ethernet port with

More information

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your

More information

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users

More information

CONNECTING THE RASPBERRY PI TO A NETWORK

CONNECTING THE RASPBERRY PI TO A NETWORK CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete

More information

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012 NBG2105 Wireless Mini Travel Router Version 1.00 Edition 1, 11/2012 Quick Start Guide User s Guide LAN IP Address Default Login Details 192.168.1.1 (Router Mode) 192.168.1.2 (Other Modes) Passwordwww.zyxel.com

More information

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS

More information

UAG715 Support Note. Revision 1.00. August, 2012. Written by CSO

UAG715 Support Note. Revision 1.00. August, 2012. Written by CSO UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

VIEW Certified Configuration Guide. Xirrus, Inc. XR-620, XR-630

VIEW Certified Configuration Guide. Xirrus, Inc. XR-620, XR-630 VIEW Certified Configuration Guide Xirrus, Inc. XR-620, XR-630 721-1007-000 Rev: B August 2015 Copyright Notice 2007-2015 Spectralink Corporation All rights reserved. Spectralink TM, the Spectralink logo

More information

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4 1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

More information

Mikrotik Router. Setup Guide

Mikrotik Router. Setup Guide Mikrotik Router Setup Guide Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN ( MATERIAL ) IS PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. GLOBAL REACH AND ITS LICENSORS MAKE NO WARRANTY

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...

More information

MB8000 Network Security and Access Control Overview

MB8000 Network Security and Access Control Overview MB8000 Network Security and Access Control Overview MB8000 employs almost all of the current popular WLAN security mechanisms. These include wireless-user isolation, closed system (by turning off SSID

More information

Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0. Issue th October 2009 ABSTRACT

Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0. Issue th October 2009 ABSTRACT Avaya CAD-SV Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0 Issue 1.0 30th October 2009 ABSTRACT These Application Notes describe the steps to configure the Cisco VPN 3000 Concentrator

More information

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 Before You Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card

More information

Integrating a Hitachi IP5000 Wireless IP Phone

Integrating a Hitachi IP5000 Wireless IP Phone November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Web Authentication Proxy on a Wireless LAN Controller Configuration Example Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on

More information

Case Study - Configuration between NXC2500 and LDAP Server

Case Study - Configuration between NXC2500 and LDAP Server Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

1. Wifi Configuration

1. Wifi Configuration 1. Wifi Configuration 1.1 Introduction WiFi connectivity is disabled by default in your AiM device, and must be enabled via a USB connection, or on the device menu. Your AiM device can be configured for

More information

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully

More information

Cisco Unified Communications Manager 7.1 SIP Configuration Guide

Cisco Unified Communications Manager 7.1 SIP Configuration Guide Valcom Session Initiation Protocol (SIP) VIP devices are compatible with Cisco Unified Communications Manager (formerly Cisco Unified CallManager) (SIP enabled versions). The Valcom device is added to

More information

ALL1682511. 500Mbits Powerline WLAN N Access Point. User s Manual

ALL1682511. 500Mbits Powerline WLAN N Access Point. User s Manual ALL1682511 500Mbits Powerline WLAN N Access Point User s Manual Contents 1. Introduction...1 2. System Requirements...1 3. Configuration...1 4. WPS...9 5. Wireless AP Settings...9 6. FAQ... 15 7. Glossary...

More information

STEP III: Enable the Wireless Network Card

STEP III: Enable the Wireless Network Card How do I configure the wireless printer without a network cable and install the printer driver in Macintosh OS X? NOTE: For successful wireless setup, you MUST know your network security settings. STEP

More information

Configuring Security Solutions

Configuring Security Solutions CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from

More information

Cisco ASA Authentication QUICKStart Guide

Cisco ASA Authentication QUICKStart Guide Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.

More information

11g WiFi ADSL Router. WL-AM604g 4 3 2 1! User Manual

11g WiFi ADSL Router. WL-AM604g 4 3 2 1! User Manual 11g WiFi ADSL Router WL-AM604g AP LINK ACT User Manual E3654 / March 2008 ASUS Contact Information ASUSTeK COMPUTER INC. (Asia-Pacific) Company address: 15 Li-Te Road, Beitou, Taipei 11259 Telephone: +886-2-2894-3447

More information

USER GUIDE Cisco Small Business

USER GUIDE Cisco Small Business USER GUIDE Cisco Small Business WBPN Wireless-N Bridge for Phone Adapters December 2011 Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries.

More information

Unified Access Point Administrator's Guide

Unified Access Point Administrator's Guide Unified Access Point Administrator's Guide Product Model: DWL-3600AP DWL-6600AP DWL-8600AP Unified Wired & Wireless Access System Release 2.0 November 2011 Copyright 2011. All rights reserved. November

More information

HIGH PERFORMANCE WIRELESS ADAPTER

HIGH PERFORMANCE WIRELESS ADAPTER Product User Guide 4x4 MIMO Wi-Fi 802.11n 5G High performance wireless adapter HIGH PERFORMANCE WIRELESS ADAPTER 1 Table of Content 1. PRODUCT OVERVIEW... 6 1.1 Introduction... 6 1.2 Application... 6 1.3

More information

Wireless Networks. Welcome to Wireless

Wireless Networks. Welcome to Wireless Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)

More information

Certified Wireless Security Professional (CWSP) Course Overview

Certified Wireless Security Professional (CWSP) Course Overview Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with RangeBooster User Guide Model No. WMP54GR Copyright and Trademarks Specifications are subject to change without notice.

More information

TECH BULLETIN NETGEN1 DOOR CONTROLLER WI-FI NETWORK CONFIG

TECH BULLETIN NETGEN1 DOOR CONTROLLER WI-FI NETWORK CONFIG TECH BULLETIN NETGEN1 DOOR CONTROLLER WI-FI NETWORK CONFIG February 12, 2008 The factory default network configuration for BlueWave Security s Wi-Fi NetGen1 door controllers is a dynamic DHCP IP address,

More information

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012 WRE2205 Wireless N300 Range Extender Version 1.00 Edition 1, 06/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com 1234 Copyright

More information

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details NWA1120 Series Wireless LAN Ceiling Mountable PoE Access Point Version 1.00 Edition 1, 08/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com

More information

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key

More information

Cisco TrustSec How-To Guide: Guest Services

Cisco TrustSec How-To Guide: Guest Services Cisco TrustSec How-To Guide: Guest Services For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

Strong Authentication for Cisco ASA 5500 Series

Strong Authentication for Cisco ASA 5500 Series Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014 WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234

More information

pfsense Captive Portal: Part One

pfsense Captive Portal: Part One pfsense Captive Portal: Part One Captive portal forces an HTTP client to see a special web page, usually for authentication purposes, before using the Internet normally. A captive portal turns a web browser

More information

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas.

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas. Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key

More information

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the

More information

Using Templates. Information About Templates. Accessing the Controller Template Launch Pad CHAPTER

Using Templates. Information About Templates. Accessing the Controller Template Launch Pad CHAPTER CHAPTER 11 This chapter describes how to add and apply templates. Templates allow you to set fields that you can then apply to multiple devices without having to reenter the common information. This chapter

More information

WiNG 5.X How-To Guide

WiNG 5.X How-To Guide WiNG 5.X How-To Guide Captive Portals Part No. TME-12-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC

More information

On-boarding and Provisioning with Cisco Identity Services Engine

On-boarding and Provisioning with Cisco Identity Services Engine On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID

More information

Wireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.

Wireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No. 2,4 GHz WIRELESS Wireless-N PCI Adapter User Guide Model No. WMP300N (EU) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of

More information

Cisco Unified Communications Manager 5.1 SIP Configuration Guide

Cisco Unified Communications Manager 5.1 SIP Configuration Guide Valcom Session Initiation Protocol (SIP) VIP devices are compatible with Cisco Unified Communications Manager (formerly Cisco Unified CallManager) (SIP enabled versions). The Valcom device is added to

More information

Controller Management

Controller Management Controller Management - Setup & Provisioning - 1 PRONTO SERVICE CONTROLLER (PN-CPP-A-1422) 2 PSC Key Features Fully interoperable with IEEE802.11b/g compliant products External AP support and management

More information

Security and Privacy Considerations in eduroam

Security and Privacy Considerations in eduroam Fondation RESTENA RedIRIS WiFi-Workshop 31 March 06 Security and Privacy Considerations in eduroam Stefan Winter 1 Overview Security in wireless networks general part the early

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager

More information

Scenario: Remote-Access VPN Configuration

Scenario: Remote-Access VPN Configuration CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security

More information

AP Device Setup. 1. Connect the Ethernet cable from your modem to the blue INTERNET (WAN) port on the AP Device.

AP Device Setup. 1. Connect the Ethernet cable from your modem to the blue INTERNET (WAN) port on the AP Device. AP Device Setup 1. Connect the Ethernet cable from your modem to the blue INTERNET (WAN) port on the AP Device. 2. Connect the AP Device s LAN port to tour computer with another LAN cable. 3. Turn on the

More information

If you have questions or find errors in the guide, please, contact us under the following address:

If you have questions or find errors in the guide, please, contact us under the following  address: 1. Introduction... 2 2. Remote Access via L2TP over IPSec... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...11 2.2.1. Astaro User Portal: Getting Preshared

More information

ProSafe 16 AP Wireless Management System WMS5316

ProSafe 16 AP Wireless Management System WMS5316 ProSafe 16 AP Wireless Management System WMS5316 Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA July 2010 202-10601-02 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Using the Cisco OnPlus Scanner to Discover Your Network

Using the Cisco OnPlus Scanner to Discover Your Network Using the Cisco OnPlus Scanner to Discover Your Network Last Revised: October 22, 2012 This Application Note explains how to use the Cisco OnPlus Scanner with the Cisco OnPlus Portal to discover and manage

More information

Configuring a BEC 7800TN Wireless ADSL Modem

Configuring a BEC 7800TN Wireless ADSL Modem Configuring a BEC 7800TN Wireless ADSL Modem Setting Up the PC Logging into BEC Configuring Wireless Setup Setup Static IP Setup Main Port Finished Firmware Update ATTENTION! Before the modem is programmed

More information

Configuring the WT-4 for ftp (Infrastructure Mode)

Configuring the WT-4 for ftp (Infrastructure Mode) En Configuring the WT-4 for ftp (Infrastructure Mode) Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Windows Vista ftp server for transmission

More information

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) En Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) Windows XP This document provides basic instructions on configuring the WT-4 wireless transmitter and a Windows XP Professional SP2

More information

Wireless Pre-Shared Key Cracking (WPA, WPA2)

Wireless Pre-Shared Key Cracking (WPA, WPA2) Wireless Pre-Shared Key Cracking (WPA, WPA2) TABLE OF CONTENTS Introduction... 2 Mechanics Of PSKs And How They Work Demystified... 2 How PSKs Can Be Cracked!... 5 WPA2 PSK Cracking Demonstration.... 6

More information

Go Wireless. Open up new possibilities for work and play

Go Wireless. Open up new possibilities for work and play Go Wireless Open up new possibilities for work and play Start with 3 pieces A typical home or small-office wireless LAN requires only 3 pieces of hardware. With these 3 pieces, you re ready to get started!

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco

More information

OvisLink OV804WVA Quick Installation Guide

OvisLink OV804WVA Quick Installation Guide OvisLink OV804WVA Quick Installation Guide 1 Indicators and Interfaces 1.1 Front Panel LED Color Status Description Power Red DSL Internet Red WAN LAN4-1 Off Power off. The initialization is normal. Initiating.

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address Title: How do I configure the wireless printer without a network cable and install the printer driver in Windows? NOTE: For successful wireless setup, you MUST know your network security settings. STEP

More information

STEP III: Connect the printer via network cable and configure the wireless network card

STEP III: Connect the printer via network cable and configure the wireless network card How do I configure the wireless printer with the temporary use of a network cable and install the printer driver in Windows? NOTE: For successful wireless setup, you will need to have a network cable for

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

Generating and Installing SSL Certificates on the Cisco ISA500

Generating and Installing SSL Certificates on the Cisco ISA500 Application Note Generating and Installing SSL Certificates on the Cisco ISA500 This application note describes how to generate and install SSL certificates on the Cisco ISA500 security appliance. It includes

More information

WAP3205 v2. User s Guide. Quick Start Guide. Wireless N300 Access Point. Default Login Details. Version 1.00 Edition 2, 10/2015

WAP3205 v2. User s Guide. Quick Start Guide. Wireless N300 Access Point. Default Login Details. Version 1.00 Edition 2, 10/2015 WAP3205 v2 Wireless N300 Access Point Version 1.00 Edition 2, 10/2015 Quick Start Guide User s Guide Default Login Details Web Address http://zyxelsetup Password www.zyxel.com 1234 Copyright 2014 ZyXEL

More information

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) Page 1 of 25 Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) Windows 7 Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) This document provides basic instructions

More information

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture State of Kansas Interim Wireless Local Area Networks Security and Technical Architecture October 6, 2005 Prepared for Wireless Policy Committee Prepared by Revision Log DATE Version Change Description

More information

Managing Web Authentication

Managing Web Authentication Obtaining a Web Authentication Certificate, page 1 Web Authentication Process, page 4 Choosing the Default Web Authentication Login Page, page 7 Using a Customized Web Authentication Login Page from an

More information

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3

More information

Windows 7. Connecting to the Wireless Network for Internet Access

Windows 7. Connecting to the Wireless Network for Internet Access Windows 7 Connecting to the Wireless Network for Internet Access Wireless Settings Network Name (SSID) CCCLIBRARY Wireless Mode (network type) Infrastructure IP settings Use DHCP WEP Disabled (DHCP must

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information