WLAN WIDS Technology White Paper

Size: px
Start display at page:

Download "WLAN WIDS Technology White Paper"

Transcription

1 WLAN WIDS Technology White Paper Issue 1.0 Date HUAWEI TECHNOLOGIES CO., LTD.

2 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Website: Huawei Industrial Base Bantian, Longgang Shenzhen People's Republic of China support@huawei.com Tel: Fax: i

3 About This Document About This Document Keyword WLAN, WIDS, WIPS Abstract An network is an open wireless network prone to various security threats, for example, attacks from rogue APs, unauthorized STAs, ad-hoc networks, spoofing APs, and DDoS attacks launched by malicious terminals. WIDS/WIPS can monitor and defend against these security threats on WLANs. Abbreviations Abbreviation Full Name Description Rogue AP An unauthorized AP. SSID Service Set Identifier Name of the WLAN access service provided by the AP. BSSID Basic Service Set Identifier MAC address of the AP. CAPWAP Control And Provisioning of Wireless Access Points IETF-defined standards for AP management and communications with the AC. WIDS Wireless Intrusion Detection System Wireless Intrusion Detection System. ii

4 Contents Contents About This Document... ii 1 Overview Basic Concepts Rogue Device Monitoring AP Working Mode Device Type Identification Device Information Report Rogue Device Identification Rogue Device Defense and Countermeasures Wireless Attack Detection Flood Attack Detection Spoofing Attack Detection Weak IV Attack Detection Defense Against Brute Force PSK Cracking Wireless Attack Defense Dynamic Blacklist Static Blacklist Benefits to Customers Typical Application Scenarios Public Places or Neighboring Companies Deployment of Rogue APs in a Company Attacks to WLANs...23 iii

5 1 Overview 1 Overview An network is an open wireless network prone to various security threats, for example, attacks from rogue APs, unauthorized STAs, ad-hoc networks, spoofing APs, and DDoS attacks launched by malicious terminals. WIDS/WIPS can monitor and defend against these security threats on WLANs. Wireless Intrusion Detection System (WIDS): detects malicious attacks and intrusions to WLANs. Wireless Intrusion Prevention System (WIPS): protects an enterprise network against access from unauthorized devices and prevents attacks to the network system. WIDS and WIPS technologies secure a wireless network, reduce interference from unauthorized devices, and protect users from malicious attacks, delivering better user experience. WIDS and WIPS provide different functions on enterprise networks of different scales: On family networks or small enterprise networks: control access from APs and clients using blacklist and whitelist. Access control is implemented on ACs and irrelevant to APs. (For more details, see AP and user access control documents.) On small and medium enterprise networks: WIDS detects attacks from unauthorized devices. On medium and large enterprise networks: detect and identify rogue devices, and take countermeasures to protect the networks. In addition to secure WLAN access, a large-sized network requires a system that can detect rogue wireless devices and reject access from these devices to protect services of authorized users. 1

6 2.1 Basic Concepts The WLAN security mechanism consists of access authentication for wireless terminals, wireless link data encryption, and WIDS/WIPS, among which the access authentication process includes link authentication and user authentication. Essentially, STA blacklist and whitelist are also applied during the terminal access authentication process. In the wireless link data encryption process, WEP, TKIP, or CCMP is used to encrypt air port data to ensure data confidentiality and security. WIDS/WIPS detects and defends against intrusion from unauthorized users or APs. Figure 2-1 shows application of the WLAN security mechanism. Figure 2-1 Application of the WLAN security mechanism STA AP AC AAA Access authentication Link encryption Policy control Detect and defend against attacks WIDS/WIPS Detect and counter unauthorized devices WIDS/WIPS As shown in the figure, WIDS and WIPS are used to detect and counter unauthorized devices. WIDS: detects unauthorized APs, bridges, user terminals, ad-hoc devices, and interference APs with overlapping channels. 2

7 WIPS: disconnects an authorized user from a spoofing AP or disconnects unauthorized APs or ad-hoc devices, and counters unauthorized devices. Basic concepts involved in WIDS/WIPS: Rogue AP: an authorized or malicious AP. A rogue AP can be an AP that is connected to a network without permission, unconfigured AP, neighbor AP, or an AP manipulated by an attacker. Rogue client: an unauthorized or malicious client, similar to a rogue AP. Rogue wireless bridge: an unauthorized or malicious wireless bridge. Monitor AP: an AP that scans or listens on wireless channels and attempts to detect attacks to the wireless network. Ad-hoc mode: a client working mode, in which clients can communicate with each other without using any other network device. 2.2 Rogue Device Monitoring Monitor APs can be deployed on a network that needs protection to monitor the entire network. The monitor APs can periodically listen on wireless frames to detect rogue devices AP Working Mode Before configuring rogue device detection on an AP, configure the AP working mode. An AP supports three working modes: access, monitoring, and hybrid: Access mode: If background neighbor probing is not enabled on an AP, the AP only transmits data of wireless users and does not monitor wireless devices on the network. If background neighbor probing is enabled, the AP can not only transmit data of wireless users but also scan wireless devices and listen on all frames on wireless channels. Monitoring mode: An AP scans wireless devices on the network and listens on all frames on wireless channels. In this mode, all WLAN services on the AP are disabled and the AP cannot transmit data of wireless users. Hybrid mode: An AP can monitor wireless devices while transmitting data of wireless users. An AP can implement the WIDS or WIPS function only when it works in monitoring or hybrid mode. Compared to APs working in access or monitoring mode, APs in hybrid mode can work alternatively between the access and monitoring modes. Figure 2-2 shows the three working modes. 3

8 Figure 2-2 Working modes of APs The monitoring channels can be all channels of the frequency band that the AP works on or channels specified by the country code Device Type Identification On a WLAN network, APs, clients, ad-hoc STAs, and wireless bridges need to be monitored. Figure 2-3 Rogue device monitoring and identification AC IP network AP AP AP Ad-hoc devices Rogue STAs Rogue APs Rogue bridges 4

9 An AP working in monitoring or hybrid mode can identify types of neighboring wireless devices according to detected management frames and data frames. The process is as follows: The AP working mode is set to monitoring or hybrid on the AC. The AC delivers the configuration to the AP. The AP listens on frames sent from neighboring wireless devices to collect information. The AP determines frame types and device types according to MAC headers in received MAC frames. A monitor AP listens on the following frames to collect information about neighboring clients, ad-hoc STAs, and wireless bridges: Beacon Association Request Association Response Reassociation Request Reassociation Response Probe Response Data frame When the AP receives an MAC frame, it checks the frame type and network type according to the protocol. The Frame Control field in the MAC header of a frame indicates the frame type. Figure 2-4 and Figure 2-5 show the MAC frame header and structure of the Frame Control field. Figure MAC frame header Figure 2-5 Frame Control field structure Protocol Version Type Subtype To DS From DS More Frag Retry More Data Protected Frame Order Bits If the Type subfield is 00, the AP checks the Subtype subfield. The values of the Subtype subfield and corresponding frame types are as follows: 1000: Beacon 0001: Association Response 0010: Reassociation Request 0011: Reassociation Response 5

10 0101: Probe Response A management frame carries the Capability Information field, which consists of ESS and IBSS subfields. The AP identifies ad-hoc networks or wireless bridges based on the two subfields. Figure 2-6 Capability Information field 1. Independent BSS (IBSS) indicates an ad-hoc network. 2. Extend Service Set (ESS) indicates an AP or a STA. If the IBSS subfield is 1, the device is an ad-hoc device; if the IBSS subfield is 0 and the ESS subfield is 0, the device is a wireless bridge; if the IBSS subfield is 0 and the ESS subfield is 1, the device is an AP or STA, which can be further clarified based on the management frame type. ESS and IBSS Subfields Beacon, Association Response, Reassociation Response Association Request, Reassociation Request 10 AP STA 01 Ad-hoc Ad-hoc 00 Wireless bridge Wireless bridge 11 Reserved The AP determines the types of rogue devices based on the collected management frames (Subtype field in the frames). When the Type subfield is 10, the frame is a data frame. The To DS and From DS subfields indicate whether the data frame is sent from or to a distribution system (DS). The following table describes combinations of the two subfields. To DS From DS Meaning 0 0 Data frame sent between two stations that are not APs in a basic service set 0 1 Data frame sent from a wireless station in a basic service set 6

11 To DS From DS Meaning 1 0 Data frame sent to a wireless station in a basic service set 1 1 Data frame sent between two wireless bridges An AP identifies device types in the following way: When receiving a Probe Request, Association Request, or Reassociation Request frame, the AP determines whether the sender is an ad-hoc device or STA according to the network type specified in the Capability Information field in Frame Body of the MAC frame. 1. Ad-hoc device: In Capability Information field, the ESS subfield is 0 and the IBSS subfield is STA: In Capability Information field, the ESS subfield is 1 and the IBSS subfield is 0. When receiving a Beacon, Probe Response, Association Response, or Reassociation Response frame, the AP determines whether the sender is an ad-hoc device or AP according to the network type specified in the Capability Information field in Frame Body of the MAC frame. 1. Ad-hoc device: In Capability Information field, the ESS subfield is 0 and the IBSS subfield is AP: In Capability Information field, the ESS subfield is 1 and the IBSS subfield is 0. The AP listens on all data frames and checks the DS subfields of the data frames to determine whether the sender is an ad-hoc device, wireless bridge, STA, or AP. 1. Ad-hoc device: In the Frame Control field of the MAC header, both the To DS and From DS subfields are Wireless bridge: Both the To DS and From DS subfields are STA: The To DS subfield is 1 and the From DS subfield is AP: The To DS subfield is 0 and the From DS field is Device Information Report The AP listens on WLAN packets sent from neighboring devices to collect information about wireless devices. APs periodically report collected device information to an AC which determines whether the neighboring devices are rogue devices. 7

12 Figure 2-7 Device information report A short interval is also called a real-time report interval, in which the AP reports incremental information about neighboring devices to the AC. The short interval ranges from 10 to 3,600, in seconds. The default value is 300s. At regular long intervals, the AP reports all information about neighboring devices that is saved locally to the AC. The long interval ranges from 120 to 360 in minutes. The default value is 360 min, that is, 6 hours. The minimum report interval is 2 hours. If massive APs report a large amount of data to the AC at the same time, the AC will be overloaded and cannot process the data. To prevent this problem, an AP postpones data report for a random time (1 to 10 minutes) when a long interval is reached. Table 2-1 Information about the detected wireless devices Item MAC address BSSID Device type SSID Vendor Channel Description MAC address of the detected device. BSSID of the detected device. Type of the detected devices, including ad-hoc devices, APs, clients, and wireless bridges. SSID of an extended service set (ESS). Vendor of the detected device. It is a 4-byte Organizationally Unique Identifier (OUI). IANA-assigned "SMI Network Management Private Enterprise Codes" Channel in which the device is detected for the last time. 8

13 Item RSSI Beacon Interval First Detected Time Last Detected Time Description RSSI detected by the device. Interval at which the detected AP and ad-hoc device send Beacon frames. First time when the device is detected. Last time when the device is detected Rogue Device Identification After receiving the neighbor information reported by the AP, the AC determines whether the device is authorized as follows: Figure 2-8 Rogue device identification Based on the neighboring device information reported by the AP, the AC identifies rogue devices as follows: Ad-hoc devices or wireless bridges: the AC regards the devices as rogue devices. 9

14 APs: The AC first checks whether the APs are authorized APs. If the BSSIDs of the APs are managed by the AC, the AC regards the APs as authorized APs; if not, the AC checks the APs' SSIDs. If the SSIDs are in the whitelist configured by the network administrator, for example, CMCC, the AC regards the APs as authorized APs; if not, the AC regards the APs as rogue APs. STAs: The AC first checks whether the STAs are authorized STAs. If the MAC addresses belong to the STAs connected to the local AC, the AC regards the STAs as authorized STAs; if not, the AC checks the STAs' BSSIDs to determine whether the STAs connect to the SSIDs in the whitelist. If the BSSIDs belong to rogue APs, the STAs are rogue STAs. If a rogue AP is identified, the AC generates an alarm and sends an SNMP trap message to the network management platform. The AC does not generate an alarm when other types of rogue devices are detected. 2.3 Rogue Device Defense and Countermeasures The attack defense and countermeasure functions can be enabled to reject access from detected rogue devices. The attack defense function restricts access from rogue APs or clients using a blacklist. The countermeasure function prevents rogue devices from operating according to the configured countermeasure mode. Monitor APs download the countermeasure list from the AC and take countermeasures to the rogue devices. If an AC identifies a rogue AP (an AP not managed by the local AC or not in the SSID whitelist), the AC notifies the monitor AP of the rogue AP. The monitor AP then uses the rogue AP's identity information to broadcast a Deauthentication frame. After STAs associating with the rogue AP receive the Deauthentication frame, they disassociate from the rogue AP. This countermeasure prevents STAs from associating with the rogue AP. When the AC identifies an unauthorized user terminal, a bridge, or an ad-hoc device (devices not managed by the local AC), the monitor AP uses the BSSID or MAC address of the unauthorized device to unicast a Deauthentication frame to disconnect the unauthorized device. Figure 2-9 shows the process of rogue device countermeasure. Rogue device detection and identification must be configured before the countermeasure function takes effect. 10

15 Figure 2-9 Rogue device countermeasure The rogue device countermeasure process is as follows: 1. The countermeasure function is enabled and the countermeasure mode is specified on the AC. 2. The AC selects rogue devices from the wireless device list reported by a monitor AP and sends the rogue device list to the monitor AP. 3. The monitor AP takes countermeasure on the rogue devices in the rogue device list sent from the AC. When a rogue device is moved to the historical list, the AC sends an instruction to the monitor AP, requesting the AP to stop countering the rogue device. The countermeasure function is valid only for rogue APs, rogue clients, and ad-hoc devices. It cannot be applied to wireless bridges. Countering rogue APs: When detecting a rogue AP, a monitor AP uses the rogue AP's address to broadcast Deauthentication frames and unicast Deauthentication frames. After receiving the Deauthentication frames, STAs disassociate from the rogue AP. Countering rogue clients: After detecting a rogue client, a monitor AP uses the BSSID or MAC address of the rogue client to send unicast Deauthentication frames, preventing the rogue client from connecting to the wireless network. The rogue client countermeasure function can also prevent an authorized client from associating with rogue APs by using identity information of the rogue AP connected to the rogue client to send unicast Deauthentication frames and Disassociation frames to the authorized client. Countering ad-hoc devices: Ad-hoc devices are countered in the same way as rogue clients. Monitor APs take countermeasures periodically on rogue devices using the configured probing mode. 11

16 2.4 Wireless Attack Detection An AP working in access or hybrid mode detect attacks in real time. When detecting an attack, the AP adds the attacker to the dynamic blacklist to protect the security of the network. Figure 2-10 WIDS attack detection AC IP network AP AP AP Attack Attack Malicious terminal STA Malicious terminal As shown in the figure, a WLAN provides access services for terminals. WIDS is enabled on the WLAN to detect various types of attacks. Flood attack detection: Malicious users may send a large number of connection request packets to AP3. AP3 will forward these packets to the AC for processing, affecting normal network running. If flood attack detection and dynamic blacklist are enabled, WIDS can detect the flood attacks of malicious users and add these users to the dynamic blacklist. All packets from these users are discarded to protect network security. Spoofing attack detection: A spoofing attacker sends attack packets in the name of another device. For example, a malicious AP or user may send spoofing Deauthentication packets to disconnect an authorized client. Upon receipt of these packets, the AP defines these packets as spoofing attack packets and reports the attacks to the AC. Weak IV attack detection: Data packets from Client1 use WEP encryption. WIDS detects weak IV attacks based on IV security policies after IV detection is enabled. When the AP detects a packet carrying a weak IV, the AP reports it to the AC. Defense against PSK cracking: Security authentication modes for wireless users include WEP shared key, WPA/WPA2 PSK, WPA/WPA2 dot1x, WAPI certificate, and WAPI PSK. Theoretically, if a client keeps exhaustive key search, it can crack the key. Therefore, a protection mechanism is added so that when the number of authentication attempts exceeds a specified threshold, packets from the client are discarded in a specified time to prevent the user from continuous brute force attacks, reducing the adverse effects of frequent negotiations on devices and the network. 12

17 WIDS can detect packet flood, spoofing, and weak IV attacks. Attack information reported by an AP includes the rogue device MAC address, channel, attack type, and received signal strength indicator (RSSI) Flood Attack Detection A flood attack occurs when an AP receives a large number of management packets or null data packets of the same type from a source MAC address within a short period. These attack packets consume many system resources of the AP, and therefore the AP cannot process packets from authorized STAs. Flood attack detection allows an AP to keep monitoring the traffic volume of each STA to prevent flood attacks. When the traffic received from a STA exceeds the allowed threshold (for example, more than 100 packets per second), the AP considers that the STA is initiating a flood attack and reports an alarm message to the AC. If the dynamic blacklist function is enabled, the attacking STA is added to the blacklist. The AP drops all the packets from this STA to prevent the network from a flood attack, until the dynamic blacklist entry ages. An AP can detect flood attacks of the following frames: Authentication Request Deauthentication Association Request Disassociation Probe Request Action (an extended management frame used for spectrum management, QoS, and HT mode) EAPOL Start EAPOL-Logoff PS-Poll (management frame sent by the STA when the STA transitions from the sleep mode to the active mode) Null (data frame sent by a STA when not data frame needs to be sent to notify an AP of the changes in the power-saving state) Figure 2-11 Flood attack Attack Rogue STA 13

18 By default, the system considers that a flood attack is initiated when it receives 30 packets (y) of the same type from a MAC address in 60 seconds (x). The values of x and y are configurable Spoofing Attack Detection A spoofing attack is also called a man-in-the-middle attack. An attacker (a rogue AP or malicious user) uses an authorized user's identity to send spoofing packets to STAs. As a result, the STAs cannot go online. Spoofing attack packets include Disassociation frames and Deauthentication frames, which are broadcast frames. After the spoofing attack detection function is enabled, an AP checks whether the source MAC address of received Disassociation frames or Deauthentication frames is its own MAC address. If so, the WLAN is undergoing a spoofing attack of Disassociation or Deauthentication packets. The AP then sends an alarm to the AC. Figure 2-12 Spoofing attack Rogue AP Disassociation frame Normal data communication is interrupted Since a spoofing AP does not use the MAC address of its own to initiate an attack, the system cannot obtain the real MAC address of the spoofing AP when detecting the attack. Therefore, the system only generates a log and an alarm to alert the network administrator but cannot use the dynamic blacklist function to defend against the attack Weak IV Attack Detection If a potential attacker obtains the shared key, he may use it to control network resources, threatening the security of the network. WEP encryption on WLANs uses a random 3-byte IV and shared key to generate a key string which is used together with plain text encryption to encrypt every packet to be sent. Weak IV refers to IV generated in an insecure way, for example, duplicate IVs or the same IV frequently generated. Attackers can easily crack the shared key because STAs send the IV in plain text in the packet header. The attackers can then access the WLAN. If the first byte of an IV ranges from 3 to 15 and the second byte is 255, the system considers the IV as a weak IV. There is an IV of special format in the WEP encryption algorithm. The key constructed using the IV generates a pseudorandom stream of bits, initial bytes of which 14

19 is correlated to the first several bytes of the key. This greatly reduces the workload in searching the RC4 key space. In other words, the IV leaks key information. Weak IV detection identifies the IV of each WEP packet to prevent attackers from cracking the shared key. When the AP detects a packet carrying a weak IV, the AP sends an alarm to the AC so that users can use other security policies to prevent STAs from using the weak IV for encryption. Figure 2-13 Password cracking through weak IVs Account, password, user information Listen on frames and crack passwords Rogue STA 1. Weak IV detection can prevent user information cracking without the need of a dynamic blacklist. 2. WEP authentication has high security risks and is randomly used Defense Against Brute Force PSK Cracking A brute force cracking, or exhaustive key search, is a cryptanalytic attack that tries every possible password combination to find the real password. For example, a password that contains only four digits may have a maximum of 10,000 combinations. The password can be cracked after a maximum of 10,000 attempts. Theoretically, attackers can use the brute force method to crack all passwords. The time taken may vary according different security mechanism and password lengths. Therefore, there are security risks of brute force attacking in all authentication modes. Link authentication security policies, including WPA/WPA2-PSK, WAPI-PSK, and WEP-Share-Key have brute force key cracking risks on air ports. User layer authentication modes, including MAC address authentication, Portal authentication, and x authentication have brute force key cracking risks, which will be described in the last chapter. 15

20 To improve key security, the PSK cracking defense function is enabled to prolong the password cracking time. An AP checks whether the number of key negotiation attempts during WPA/WPA2-PSK, WAPI-PSK, or WEP-Shared-Key authentication exceeds the configured threshold. If so, the AP considers that a user is using the brute force method to initiate an attack and reports an alarm to the AC. If the dynamic blacklist function is enabled, the AP adds the user to the dynamic blacklist, drops all the packets from the user until the dynamic blacklist entry ages. PSK authentication and WEP shared key authentication are implemented on the AC and AP respectively; therefore, the brute force attack detection points are also different, as shown in the following figure. Figure 2-14 Brute force PSK cracking detection and WEP shared key cracking Defense against brute force cracking attacks is also required for user authentication modes, such as MAC address authentication, Portal authentication, and 802.1x authentication. The defense principles are as follows: MAC address authentication: The MAC address of the terminal is used as the account for RADIUS authentication. As long as the user fails the authentication, the user is "punished" and added to the blacklist. The user is denied access in the specified time (for example, 60s). Portal authentication/802.1x authentication: If a user fails the authentication for three consecutive times within 60 seconds (the number of allowed authentication attempts and the time threshold can be configured), the user is considered initiating a brute force 16

21 cracking attack and added to the blacklist. The user is denied access in the specified time (for example, 60s). 2.5 Wireless Attack Defense On small and medium WLAN networks, WIDS can be enabled to detect security threats, including flood, weak IV, and spoofing attacks. This function enables an AP to add attackers to the dynamic blacklist and send attacker information to the AC. The AC then sends trap messages to the network management system (NMS) to alert the network administrator Dynamic Blacklist The WIDS attack defense process is as follows: Figure 2-15 WIDS attack defense 1. The dynamic blacklist function is enabled and the blacklist entry aging time is set on the AC. 2. The AC sends the dynamic blacklist enabled flag and blacklist entry aging time to the AP. 3. The WIDS attack detection mode, detection period, and detection threshold (number of packets detected within the specified period to identify an attack) are configured on the AC. 4. The AC sends the detection mode, detection period, and detection threshold to the AP. 5. The AP performs attack detection according to the configuration. 17

22 6. When the AP detects an attack, it reports the attack information to the AC, including the rogue device MAC address and attack type. The AC receives the attack information and adds the received information to the attack record. If the AP does not detect attacks from this rogue device again in the next three attack detection periods, it requests the AC to delete the corresponding attack record. 7. The AP determines whether to add the rogue device to the dynamic blacklist. If the AP adds the rogue device to the dynamic blacklist, the AP reports the dynamic blacklist entry to the AC. The AC adds this entry to the dynamic blacklist cache. 8. The AC records attack types and sends trap messages to report the attack types to the NMS. 9. The AP drops packets sent from blacklisted devices. 10. When the configured aging time (penalty time) is reached, dynamic blacklist entries are automatically deleted and normal access of the attacker is restored. The following figure shows how WIDS-enabled AP processes attacks. Figure 2-16 WIDS attack detection process Receive packet Is blacklist enabled? No Is the device in the blacklist? No Is flood attack detection enabled? No Does the traffic exceed upper limit? No Yes Is spoofing attack detection enabled? No Yes Report attack device information to the AC Yes Is the packet a broadcast Deauthentication frame/ Disassociation frame? No Is weak IV attack detection enabled? No Yes Yes Does the packet contain weak IV? No Is defense against WEP shared key cracking enabled? Yes Discard packet Report the attack to the AC Yes Does the number of WEP key authentication attempts exceed the uppler limit? No Normal processing After the AC receives the attacking device information reported by the AP, it adds the attacker to the attacking device list, collects attack statistics based on the attack types, and sends trap messages. The devices on the attacking device list are sequenced based on the detection time. When the number of attacking device entries reaches the maximum, the new attacking device entries overwrite the previous ones. Statistics information: Upon receipt of WIDS attack detection packets sent from the AP, the AC collects attack statistics, including the attack types and the number of attacks. 18

23 2.5.2 Static Blacklist Traps: The AC sends trap messages only when spoofing and flood attacks are detected. The trap message carries the AP's MAC address, attacking device's MAC address, channel, and attack type. The alarm suppression and match functions need to be enabled. If a flood attack or a PSK cracking attack is detected, the AC enabled with the dynamic blacklist adds the attacking device to the dynamic blacklist and delivers the blacklist to the AP. The AP discards packets from the attacking device. If the attacking device has associated with the AP, the AP must disassociate from the device, and the drive provides the disassociation interface. The AC needs to maintain dynamic blacklist entries and aging mechanism of the entries. After the dynamic blacklist is aged out, the AC delivers information to the AP, requesting the AP to delete the blacklist. The same attacking device may be detected by different APs. Therefore, the entry must contain list information about the AP that detects the attack. The aging mechanism takes effect only on the correct AP. If the AC cannot deliver the dynamic blacklist deletion information to the AP, the dynamic blacklist remains being effective on the AP. To prevent this problem, the AC and AP use the same dynamic blacklist aging mechanism. After detecting an attack, the device enabled with the dynamic blacklist automatically adds the attacker to the blacklist and denies access of the attacker to protect the network. The system administrator can manually add the MAC addresses of rogue terminals or APs to the static blacklist to defend against rogue devices (terminals or APs) that are already known. Devices in the static blacklist cannot access the network. The WLAN supports two types of static blacklists: STA static blacklist: The AP discards packets from terminals with MAC addresses in the STA blacklist to prevent these terminals from accessing the network. AP static blacklist: The AC discards packets from APs with MAC addresses in the AP blacklist to prevent the APs from accessing the AC through the CAPWAP tunnels. WLANs can also use the whitelist function to prohibit access of rogue devices. Huawei offers STA and AP whitelists. Huawei static STA blacklist can also be used for countering unauthorized devices. The system administrator can add devices to be countered to the STA static blacklist. When the devices are detected, the system takes countermeasures against them. 19

24 3 Benefits to Customers 3 Benefits to Customers WIDS and WIPS provide different functions on enterprise networks of different scales: On family networks or small enterprise networks: control access from APs and clients using blacklist and whitelist. Access control is implemented on ACs and irrelevant to APs. (For more details, see AP and user access control documents.) On small and medium enterprise networks: WIDS detects attacks from unauthorized devices. On medium and large enterprise networks: detect and identify rogue devices, and take countermeasures to protect the networks. In addition to secure WLAN access, a large-sized network requires a system that can detect rogue wireless devices and reject access from these devices to protect services of authorized users. WIDS also detects attacks such as flood attacks, weak IV attacks, spoofing attacks, WPA/WPA2/WAPI pre-shared key cracking, and WEP shared key cracking. WIDS records logs, statistics, and alarms to notify network administrators of the attacks. The AC adds devices that perform flood attacks and key cracking to the dynamic blacklist and rejects packets from these devices within the aging time of the dynamic blacklist. 20

25 4 Typical Application Scenarios 4 Typical Application Scenarios 4.1 Public Places or Neighboring Companies Figure 4-1 Networking in airport with multiple carrier networks ChinaNet AC CMCC AC IP network ChinaNet CMCC ChinaNet CMCC In public places, such as airports or railway stations, multiple carriers deploy WLANs to cover public areas. APs of each WLAN system can listen on WLAN signals of other carriers' APs. Signal interference between different WLAN systems cannot be avoided, but all the APs are authorized. To prevent incorrect report about rogue APs or STAs, configure the SSID whitelist on the devices. Key configuration commands are as follows: (ChinaNet is taken as an example) # Configure WIDS. [AC-wlan-view] ap 0 radio 0 [AC-wlan-radio-0/0] work-mode hybrid Warning: Modify the work mode may cause business interruption, are you sure to continue?(y/n)[n]:y [AC-wlan-radio-0/0] device detect enable # Add CMCC to the SSID whitelist. 21

26 4 Typical Application Scenarios [AC-wlan-view] ssid-whitelist ssid CMCC Figure 4-2 Networking for an office building shared by multiple companies Floor 5 Company A Floor 4 Company B The preceding configuration commands apply to scenarios where multiple companies share one office building. As shown in the preceding figure, company A leases offices in Floor 5 while company B leases offices in Floor 4. Devices of company B can receive signals from company A. To prevent incorrect report on rogue devices, company B needs to add company A to the SSID whitelist. 4.2 Deployment of Rogue APs in a Company To protect information security or prevent interference to the WLAN system, the company forbids employees to deploy APs without authorization. Enable WIDS to detect unauthorized devices in the surroundings. Figure 4-3 Deployment of rogue APs in a company SSID=Corp AC Company A AP AP AP SSID=Jack SSID=Corp STA C 22

27 4 Typical Application Scenarios As shown in the preceding figure, some employees deploy Fat APs or enable the AP function on personnel smart terminals without company authorization. The unauthorized AP on the left offers the SSID Jack to connect personnel devices, for example, pads. The signals transmitted from the AP may cause interference to the company's WLAN system or even leak company information. The AP on the right poses higher security risks. The SSID provided by the AP is the same as the company SSID. The AP pretends to be an authorized AP on the company WLAN to set up connections with company devices and intercept company information. To defend against the rogue APs, enable WIDS on the company's WLAN system to counter the APs using the spoofing SSID. After WIDS and WIPS are configured on the AC, the monitor AP collects neighbor information and reports it to the AC. When the AC identifies the rogue AP, the AC notifies the monitor AP of the rogue AP's identity information. The monitor AP then uses the rogue AP's identity information to broadcast a Deauthentication frame. After STAs associating with the rogue AP receive the Deauthentication frame, they disassociate from the rogue AP. This countermeasure prevents STAs from associating with the rogue AP. Key configuration commands are as follows: # Configure WIDS. [AC-wlan-view] ap 0 radio 0 [AC-wlan-radio-0/0] work-mode hybrid Warning: Modify the work mode may cause business interruption, are you sure to continue?(y/n)[n]:y [AC-wlan-radio-0/0] device detect enable # Configure WIPS to counter the rogue APs. [AC-wlan-radio-0/0] countermeasures enable [AC-wlan-radio-0/0] countermeasures mode rogue ap [AC-wlan-radio-0/0] quit 4.3 Attacks to WLANs Figure 4-4 Attacks to WLANs AC IP network AP AP AP Attack Attack Malicious terminal STA Malicious terminal 23

28 4 Typical Application Scenarios Malicious users or terminals infected with viruses may attack the system. After WIDS is enabled on the company WLAN, the WLAN devices can detect flood, spoofing, and brute force cracking attacks. After a rogue terminal is identified, the WLAN device adds the rogue terminal to the dynamic blacklist and discards packets from the terminal within the specified period to protect the system against attacks. Key configuration commands are as follows: # Configure WIDS. [AC-wlan-view] ap 0 radio 0 [AC-wlan-radio-0/0] work-mode hybrid Warning: Modify the work mode may cause business interruption, are you sure to continue?(y/n)[n]:y [AC-wlan-radio-0/0] device detect enable # Enable the dynamic blacklist function. [AC-wlan-view] ap 0 radio 0 [AC-wlan-radio-0/0] dynamic-blacklist enable 24

WLAN Positioning Technology White Paper

WLAN Positioning Technology White Paper WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

CS 356 Lecture 29 Wireless Security. Spring 2013

CS 356 Lecture 29 Wireless Security. Spring 2013 CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

WLAN Access Security Technical White Paper. Issue 02. Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD.

WLAN Access Security Technical White Paper. Issue 02. Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD. WLAN Access Security Technical White Paper Issue 02 Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD. . 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by

More information

WLAN Spectrum Analyzer Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2013-05-10

WLAN Spectrum Analyzer Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2013-05-10 WLAN Spectrum Analyzer Technology White Paper Issue 01 Date 2013-05-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or

More information

NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015 NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w

More information

How To Secure Wireless Networks

How To Secure Wireless Networks Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements

More information

Technical Brief. Wireless Intrusion Protection

Technical Brief. Wireless Intrusion Protection Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion

More information

WLAN 802.11w Technology

WLAN 802.11w Technology Technical white paper WLAN 80.w Technology Table of contents Overview... Technical background... Benefits... 80.w technology implementation... Management Frame Protection negotiation... Protected management

More information

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2 Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK

More information

United States Trustee Program s Wireless LAN Security Checklist

United States Trustee Program s Wireless LAN Security Checklist United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following

More information

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

Huawei WLAN Authentication and Encryption

Huawei WLAN Authentication and Encryption Huawei WLAN Authentication and Encryption The Huawei integrated Wireless Local Area Network (WLAN) solution can provide all-round services for municipalities at various levels and enterprises and institutions

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

Enterprise A Closer Look at Wireless Intrusion Detection:

Enterprise A Closer Look at Wireless Intrusion Detection: White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become

More information

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm

More information

Wireless LAN Pen-Testing. Part I

Wireless LAN Pen-Testing. Part I Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,

More information

United Security Technology White Paper

United Security Technology White Paper United Security Technology White Paper United Security Technology White Paper 1 Challenges...6 1.1 Security Problems Caused by Mobile Communication...6 1.2 Security Fragmentation Problems...8 2 United

More information

Research In Motion D. Stanley, Ed. Aruba Networks March 2009

Research In Motion D. Stanley, Ed. Aruba Networks March 2009 Network Working Group Request for Comments: 5416 Category: Standards Track P. Calhoun, Ed. Cisco Systems, Inc. M. Montemurro, Ed. Research In Motion D. Stanley, Ed. Aruba Networks March 2009 Control and

More information

Security in IEEE 802.11 WLANs

Security in IEEE 802.11 WLANs Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh

More information

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6 (Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4 1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

Air Marshal. White Paper

Air Marshal. White Paper White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System

More information

Configuring Security Solutions

Configuring Security Solutions CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

Closing Wireless Loopholes for PCI Compliance and Security

Closing Wireless Loopholes for PCI Compliance and Security Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop

More information

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

chap18.wireless Network Security

chap18.wireless Network Security SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: jungkyu21@seoultech.ac.kr Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

VLAN and QinQ Technology White Paper

VLAN and QinQ Technology White Paper VLAN and QinQ Technology White Paper Issue 1.01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Industrial Communication. Securing Industrial Wireless

Industrial Communication. Securing Industrial Wireless Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...

More information

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless security. Any station within range of the RF receives data Two security mechanism 802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network

WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless

More information

Configuring connection settings

Configuring connection settings Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90

More information

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All

More information

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong

More information

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details NWA1120 Series Wireless LAN Ceiling Mountable PoE Access Point Version 1.00 Edition 1, 08/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com

More information

Virtual Access Points

Virtual Access Points Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1

More information

Avaya WLAN Orchestration System

Avaya WLAN Orchestration System Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network

More information

Nokia E61i Configuring connection settings

Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or

More information

Protection Ripple in ERP 802.11 WLANs White Paper

Protection Ripple in ERP 802.11 WLANs White Paper Protection Ripple in ERP 802.11 WLANs White Paper June 2004 Planet3 Wireless, Inc. Devin Akin, CTO Devin@cwnp.com Copyright 2004 The CWNP Program www.cwnp.com Page 1 Understanding Use of 802.11g Protection

More information

IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1

IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1 IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320 Management Guide Software Release v2.0.0.1 www.edge-core.com Management Guide ECW5320 Indoor Enterprise Access Point IEEE 802.11a/ac/n/b/g

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

Avaya WLAN Orchestration System

Avaya WLAN Orchestration System Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network

More information

Security Policy. Trapeze Networks

Security Policy. Trapeze Networks MX-200R-GS/MX-216R-GS Mobility Exchange WLAN Controllers Security Policy Trapeze Networks August 14, 2009 Copyright Trapeze Networks 2007. May be reproduced only in its original entirety [without revision].

More information

Certified Wireless Security Professional (CWSP) Course Overview

Certified Wireless Security Professional (CWSP) Course Overview Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

How To Manage A Wireless Network With Avaya Wlan 9100 Series (Wlan) System (Wos)

How To Manage A Wireless Network With Avaya Wlan 9100 Series (Wlan) System (Wos) Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network

More information

WHITE PAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

WHITE PAPER. Wireless LAN Security for Healthcare and HIPAA Compliance WHITE PAPER Wireless LAN Security for Healthcare and HIPAA Compliance Wireless LAN Security for Healthcare and HIPAA Compliance Wireless deployments in healthcare institutions have accelerated as mobility

More information

All You Wanted to Know About WiFi Rogue Access Points

All You Wanted to Know About WiFi Rogue Access Points All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com

More information

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G. Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics

More information

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be

More information

Recommended 802.11 Wireless Local Area Network Architecture

Recommended 802.11 Wireless Local Area Network Architecture NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless

More information

Ensuring HIPAA Compliance in Healthcare

Ensuring HIPAA Compliance in Healthcare The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,

More information

Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n

Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing

More information

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved 802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

More information

WiFi Security Assessments

WiFi Security Assessments WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Observer Analyzer Provides In-Depth Management

Observer Analyzer Provides In-Depth Management Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,

More information

HP 830 Series PoE+ Unified Wired-WLAN Switch, HP 850/870 Unified Wired-WLAN Appliance, and HP 10500/7500 20G Unified Wired-WLAN Module FAQ

HP 830 Series PoE+ Unified Wired-WLAN Switch, HP 850/870 Unified Wired-WLAN Appliance, and HP 10500/7500 20G Unified Wired-WLAN Module FAQ HP 830 Series PoE+ Unified Wired-WLAN Switch, HP 850/870 Unified Wired-WLAN Appliance, and HP 10500/7500 20G Unified Wired-WLAN Module FAQ Copyright 2014 Hewlett-Packard Development Company, L.P. The information

More information

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC. IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Useful CLI Commands. Contents. Enable Logging

Useful CLI Commands. Contents. Enable Logging Useful CLI Commands Contents Enable Logging... 1 Interface... 3 AP... 4 ARM... 9 User... 11 Client Troubleshooting Typical... 16 Radio Tests (rft)... 16 Windows Client data... 18 Enable Logging (Aruba3200)

More information

Universiti Teknologi MARA. 802.11 MAC Layer Sniffer Using Spoof Detection Algorithm

Universiti Teknologi MARA. 802.11 MAC Layer Sniffer Using Spoof Detection Algorithm Universiti Teknologi MARA 802.11 MAC Layer Sniffer Using Spoof Detection Algorithm Azwan Abdul Satar Thesis submitted in fulfillment of the requirements for Bachelor of Science (Hons) Information Technology

More information

Overview of 802.11 Networks and Standards

Overview of 802.11 Networks and Standards Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

Chapter 2 Wireless Networking Basics

Chapter 2 Wireless Networking Basics Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).

More information

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

A Technical Tutorial on the IEEE 802.11 Protocol

A Technical Tutorial on the IEEE 802.11 Protocol A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview

More information

Wireless Networks. Welcome to Wireless

Wireless Networks. Welcome to Wireless Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)

More information

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks Understanding WiFi Security Vulnerabilities and Solutions Dr. Hemant Chaskar Director of Technology AirTight Networks WiFi Proliferation Global WiFi Radio Chipset Sales 387 307 Millions 120 200 2005 2006

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

IEEE 802.1X For Wireless LANs

IEEE 802.1X For Wireless LANs IEEE 802.1X For Wireless LANs John Roese, Ravi Nalmati, Cabletron Albert Young, 3Com Carl Temme, Bill McFarland, T-Span David Halasz, Aironet Paul Congdon, HP Andrew Smith, Extreme Networks Slide 1 Outline

More information

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

Vulnerabilities of Wireless Security protocols (WEP and WPA2) Vulnerabilities of Wireless Security protocols (WEP and WPA2) Vishal Kumkar, Akhil Tiwari, Pawan Tiwari, Ashish Gupta, Seema Shrawne Abstract - Wirelesses Local Area Networks (WLANs) have become more prevalent

More information

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074 Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania tomai@econ.ubbcluj.ro Abstract: The paper has four sections.

More information

Agenda. What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI

Agenda. What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI Hybrid AP NWA-316x Agenda What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI What is Hybrid AP? Hybrid AP, known as the Hybrid Wireless Access

More information

Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks

Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks The importance of Wireless today Increasingly in the Corporate Environment, Wireless is becoming an enabling technology to facilitate

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

Your 802.11 Wireless Network has No Clothes

Your 802.11 Wireless Network has No Clothes Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract

More information

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2

More information

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 Configuration... 2 2.1 Radio Settings... 2 2.1.1 Radio Channels...

More information

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd. Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised

More information

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key

More information

Part Number: 203285. HG253s V2 Home Gateway Product Description V100R001_01. Issue HUAWEI TECHNOLOGIES CO., LTD.

Part Number: 203285. HG253s V2 Home Gateway Product Description V100R001_01. Issue HUAWEI TECHNOLOGIES CO., LTD. Part Number: 203285 HG253s V2 Home Gateway Issue V100R001_01 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

Vocera Infrastructure Planning Summary. B3000n Compatible

Vocera Infrastructure Planning Summary. B3000n Compatible Vocera Infrastructure Planning Summary B3000n Compatible Notice Copyright 2002- Vocera Communications, Inc. All rights reserved. Vocera is a registered trademark of Vocera Communications, Inc. This software

More information

CSC574: Computer and Network Security

CSC574: Computer and Network Security CSC574: Computer and Network Security Lecture 21 Prof. William Enck Spring 2016 (Derived from slides by Micah Sherr) Wireless Security Wireless makes network security much more difficult Wired: If Alice

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information