White paper. Tunneled Internet Gateway
|
|
|
- Darrell Flowers
- 10 years ago
- Views:
Transcription
1 Wi-Fi Access for Mobile Devices in High-Security Environments
2 Table of Contents The Challenge: Wi-Fi access for mobile devices in high-security environments Aruba solution How the works Appendix Topology diagrams About Aruba Networks, Inc
3 The challenge: Wi-Fi access for mobile devices in high-security environments Since the debut of the iphone in 2007, the private sector has seen a proliferation of personal mobile devices used in the workplace. Government customers, while slower to adopt commercially available mobile devices in the workplace, recognize the cost and productivity advantages and are looking for ways to increase their usage and speedup adoption. Many civilian and military organizations have already begun large-scale acquisitions of commercial off-the-shelf (COTS) mobile devices for distribution to relevant personnel. The February 2013 purchase by the U.S. Department of Defense of 630,000 Apple ios-based mobile devices is just one example. These devices require Internet connectivity to unlock their full functionality and productivity benefits. Yet in many government facilities, security requirements around network connectivity mean that commercial mobile devices must be air-gapped from restricted networks, necessitating a costly build-out of parallel network infrastructure just to link these devices to an Internet gateway. Aruba solution In situations where a restricted wireless LAN (WLAN) is the only available network within the premises, enabling wireless connectivity for mobile devices requires infrastructure changes in the form of a parallel network with dedicated access points (APs) for guest use or cellular antennas installed within the facility for 3G/4G connectivity to the cellular network. Both options are costly, time-consuming and require ongoing maintenance. Aruba Networks offers an alternative known as the. In environments with Aruba controller-based WLANs, mobile device users can connect to the local Aruba AP and securely traverse restricted intermediate networks to access an Internet gateway. Unsecure Internet traffic is logically and cryptographically separated from restricted network traffic within the AP and across the network. The result is that mobile device users are able to access the Internet without compromising the security of the restricted network. How the works Summary The is enabled through software configuration to any new or existing controller-based Aruba WLAN. Mobile users connect their devices to the Internet gateway SSID, creating an encrypted session with an Aruba Mobility Controller deployed in the restricted network. The controller maintains logical separation between Internet sessions and restricted sessions using a Common Criteria EAL4+ validated firewall, then routes Internet traffic through an additional encrypted data tunnel to a router attached to a commercial Internet service provider. The result is a secure, simple and low-cost network overlay with strong separation between restricted and Internet data. Technical details Wireless APs are typically connected to a restricted wired network, which provides IP connectivity between the AP and an Aruba Mobility Controller installed in a network data center or wiring closet. Policy-compliant wireless devices may access the restricted network directly after authentication. These devices typically implement strong forms of encryption and authentication, and may have numerous locked-down settings. However, unsecure devices must not have access to the restricted wired network and this requires a strong separation mechanism. Only the Aruba architecture can achieve this using central encryption. With Aruba, wireless traffic is not decrypted or processed in the AP it is wrapped in an IP tunneling protocol and sent across the wired network to the Aruba Mobility Controller. When the traffic arrives at the Mobility Controller, is it unwrapped, decrypted and converted into a standard network frame. All other WLAN vendors perform encryption/ decryption inside the wireless AP, putting the network at serious risk for compromise. With the, mobile devices are treated similarly to guest access devices. Authentication is required through the use of a browser-based captive portal. After authentication, traffic from a mobile device is separated within the Mobility Controller based on the authenticated role of the mobile device user. 3
4 PWR ENET 11A/N 11B/G/N 7210 POWER STATUS PEERED MENU ENTER White paper The integrated EAL4+-validated firewall within the Mobility Controller forces all unsecure mobile device traffic into a second encrypted IP tunnel, destined for an Internet gateway. At the same time, other policy-complaint devices using strong authentication mechanisms are given access to the internal restricted network. Any attempt by an unsecure mobile device to access resources on the restricted network is blocked, and can optionally trigger the client to be disconnected. Since the Mobility Controller can determine what type of device is authenticating through device fingerprinting capabilities, additional restrictions can be implemented to only allow authorized device types onto the network. The diagram below shows an example of how separation would occur with the. Role-Based Access Control ClearPass AAA SSID-Based Access Control Command RADIUS LDAP AD Access Rights User 1 Compliant Device: Connects to SSID 1 SSID 1: Restricted Staff Restricted SSID 2: Internet Gateway Voice Captive Portal Encrypted Tunnel Encrypted Tunnel User 2 Commercial Device: Connects to SSID Single Physical AP Internet Aruba Controller Figure 1: Strong separation in the. Figure 2: Customizable captive portal registration page. 4
5 Authentication Authentication of Internet-only mobile devices is typically provided by two mechanisms Wi-Fi using WPA2-PSK or captive portal per-user authentication. Wi-Fi using WPA2-PSK offers AES-128 encryption with authentication provided by a preshared key. Even though the Internet-only network is untrusted, it is important to provide an encrypted/authenticated network so the general public will be unable to access it. The preshared key is commonly distributed to authorized users by simply printing it out and posting on walls within a facility. Captive portal per-user authentication is optional. It is used when an organization wishes to establish the identity of an individual Internet user. The captive portal requires a standard web browser and can be customized for look-andfeel with an acceptable-use policy statement inserted for legal purposes. The Aruba ClearPass Policy Manager serves as the backend authentication database and links to many popular directory services in order to verify authorized user credentials and IT access policies. Upon connecting to the network and entering a valid username and password, the client device and user are Internet-only authenticated, meaning that the device can be utilized for Internet access only. Role-based user and device policies can be continuously implemented to prevent access to restricted network data and resources. Internet access using HTTP and HTTPS protocols are allowed when accessing the Internet and other protocols can be defined by the administrator as needed. Implementing the Mobility Controller using the above configuration provides sufficient data separation from restricted network traffic and, for U.S. DoD customers, provides compliance with Standard Technical Implementation Guides (STIGs) for the DISA Wireless Overview and Internet Gateway Only. 1 Potential use-cases Any government or enterprise facility that has a restricted network as the sole available wireless network to access the Internet would be an eligible use-case for the Tunneled Internet Gateway. Examples include, but are not limited to: Military facilities Military contractors and suppliers Embassies/consulates Homeland security/national police Law enforcement Department of Energy laboratories Treasury/tax bureaus STIG compliance Implementation in U.S. DoD sites requires compliance with the U.S. Defense Information Systems Agency STIGs. The Aruba is compliant with the following STIGs (detail in appendix): STIG-ID: WIR0100 STIG-ID: WIR0105 STIG-ID: WIR0110 STIG-ID: WIR0120 STIG-ID: WIR0121 STIG-ID: WIR0122 STIG-ID: WIR0123 STIG-ID: WIR0124 STIG-ID: WIR-0130 In addition to compliance with the above STIGs, Aruba mobility solutions have been tested and validated compliant with Common Criteria and FIPS Appendix STIG compliance details Rule Version (STIG-ID): WIR0100 Rule title: The relevant U.S. Forces Command (USFORSCOM) or host nation must approve the use of wireless equipment prior to operation of such equipment outside the United States and its possessions (US&P). Vulnerability discussion: When using a wireless system outside of the US&P, host nation wireless spectrum regulations must be followed. Otherwise the system could interfere with or be disrupted by host nation communications systems. 1 Specific STIGs in Appendix 5
6 Compliance: With Aruba s mobility solution is in operation already at all U.S. Air Force bases. The overall solution has been approved and currently meets the requirements from this STIG rule. Depending on where Aruba controllers are deployed and configured at initial set up time, it should be set for the appropriate country code to comply with the spectrum regulations both within the United States and other host nations. This configuration setting adheres to the regulatory domain regulations for these nations and is automatically set for all APs deployed within the overall solution. Some of the considerations include use of specific frequencies (i.e. 2.4 GHz, 5 GHz, and 4.9 GHz), transmit power, and EIRP (Equivalent Isotropically Radiated Power) maximum allowances, based on the host nation, etc. Controllers deployed within the U.S. are based on a specific U.S. version of the controller. In this case, the controller is automatically set for U.S. regulatory domain settings and cannot be changed. Controllers deployed OCONUS (except Alaska, Hawaii and other U.S. territories) would deploy a rest-of-world controller, where the country code of deployment is selected at the initial setup configuration time. Rule Version (STIG-ID): WIR0105 Rule title: WLAN SSIDs must be changed from the manufacturer s default to a pseudo random word that does not identify the unit, base, organization. Vulnerability discussion: An SSID identifying the unit, site or purpose of the WLAN or is set to the manufacturer default may cause an OPSEC vulnerability. Compliance: While the Aruba Mobility Controller ships with default values and profiles, the default SSID is disabled by default. Thus, no SSID can be seen at initial startup time, requiring the configuration of new SSIDs, with various security configurations, to be implemented. Rule Version (STIG-ID): WIR0110 Rule title: The WLAN inactive session timeout must be set for 30 minutes or less. Vulnerability discussion: A WLAN session that never terminates due to inactivity may allow an opening for an adversary to highjack the session to obtain access to the network. Compliance: Upon client authentication to the network, configurable AAA timers exist within the controller to monitor client activity. The idle-timeout AAA timer is set to five minutes of idle time (default). This is the maximum number of minutes after which a client is considered idle if there is no user traffic from the client. The timeout period is reset if there is user traffic. Idle clients are removed from the controller as authenticated client sessions. These clients will require a re-authentication to be able to get back onto the network. Rule Version (STIG-ID): WIR0120 Rule title: WLAN signals must not be intercepted outside areas authorized for WLAN access. Vulnerability discussion: Most commercially-available WLAN equipment is preconfigured for signal power appropriate to most applications of the WLAN equipment. In some cases, this may permit the signals to be received outside the physical areas for which they are intended. This may occur when the intended area is relatively small, such as a conference room, or when the AP is placed near or window or wall, thereby allowing signals to be received in neighboring areas. In such cases, an adversary may be able to compromise the site s OPSEC posture by measuring the presence of the signal and the quantity of data transmitted to obtain information about when personnel are active and what they are doing. Furthermore, if the signal is not appropriately protected through defense-in-depth mechanisms, the adversary could possibly use the connection to access DoD networks and sensitive information. Compliance: There are a number of configurable options within the Aruba Mobility Controller that limit RF and the ability of RF to be intercepted from areas where such interception is undesirable. For example, Aruba Adaptive Radio Management (ARM) has options to limit both transmit-power in order to mitigate interference, along with coverage of such APs. Typically, ARM sets transmit powers by default to a value less than max, depending on how APs are deployed. In addition to this, other mechanisms can be deployed. For example, depending on where the APs are deployed (and their surrounding neighboring areas), these APs can be specifically configured to limit transmit power to a maximum. The Max Tx EIRP parameter within the ARM profile can be configured to values anywhere from 3 dbm up to the maximum allowed based on the regulatory domain of the host country. In addition to the above, Aruba offers APs that allow for the implementation of directional antennas, as discussed in the Fix section of this rule. By utilizing directional antennas, RF coverage is provided towards the direction that the antennas are facing, limiting RF emission from the rear of the antenna. 6
7 Rule Version (STIG-ID): WIR0121 Rule title: WLAN AP must be configured for Wi-Fi Alliance WPA2 security. Vulnerability discussion: The Wi-Fi Alliance s WPA2 certification provides assurance that the device has adequate security functionality and can implement the IEEE i standard for robust security networks. The previous version of the Wi-Fi Alliance certification, WPA, did not require AES encryption, which must be supported for DoD WLAN implementations. Devices without any WPA certification likely do not support required security functionality and could be vulnerable to a wide range of attacks. WPA2 Enterprise or WPA2 Personal (WPA2-PSK) is acceptable. Compliance: Aruba Mobility Controllers support the use of both WPA2 Enterprise with i and WPA2-PSK (Personal), or both simultaneously. Both are FIPS validated encryption algorithms that are allowed to be used within the Internet Gateway Only STIG. When configuring an SSID to use WPA2-PSK, the use of a strong passphrase is required and supported. Rule Version (STIG-ID): WIR0122 Rule title: The password configured on the WLAN AP for key generation and client access must be set to a 14-character or longer complex password as required by USCYBERCOM CTO 07-15Rev1. Applies to the passphrase for WPA2-PSK. Vulnerability discussion: If the organization does not use a strong passcode for client access, then it is significantly more likely that an adversary will be able to obtain it. Once this occurs, the adversary may be able to obtain full network access, obtain DoD sensitive information, and attack other DoD information systems. Compliance: Aruba Mobility Controllers support the ability for the WPA2-PSK passphrase to be comprised of at least two of each of the following: upper case letter, lower case letter, number, and special character, as required per the STIG for all APs/controllers that will not use AAA services (RADIUS) for client authentication. Rule Version (STIG-ID): WIR0123 Rule title: WLAN APs and supporting authentication servers used for Internet-only connections must reside in a dedicated subnet off of the perimeter firewall. Vulnerability discussion: If the AP or its supporting authentication server is placed in front of the perimeter firewall, then it has no firewall protection against an attack. If the AP or its supporting authentication server is placed behind the perimeter firewall (on the internal network), then any breach of these devices could lead to attacks on other DoD information systems. Compliance: Aruba Mobility Controllers support the ability to implement non-niprnet based VLANs and IP subnets from within the controller. Separation between NIPRNet and non-niprnet IP subnets are provided from within the controller. The Aruba Mobility Controller supports an integrated stateful policy enforcement firewall accredited to EAL4+ that allows traffic for Internet Gateway Only traffic to be placed in a VLAN, IP subnet, or tunnel that places it away and off of the perimeter firewall. In essence, the Aruba Mobility Controller acts as a perimeter firewall by separating non-niprnet traffic and keeping it outside the firewall towards the DMZ and Internet. The controller supports both user and device role based policies. However, it can also support controller port based policies denying incoming traffic initiated from the outside. Rule Version (STIG-ID): WIR0124 Rule title: The perimeter firewall must be configured as required for the dedicated Internet-only WLAN infrastructure subnet. Vulnerability discussion: If the perimeter firewall is not configured as required, users connecting to an AP may be able to compromise internal DoD information systems. Compliance: Aruba s mobility solution provides compliance to this as described in the compliance information from Rule Version WIR0123 mentioned above. Rule Version (STIG-ID): WIR0130 Rule title: WLAN equipment obtained through acquisition programs must be JITC interoperability certified. Vulnerability discussion: Interoperability certification assures that warfighters can communicate effectively in joint, combined, coalition, and interagency environments. There is some degree of risk that systems without JITC certification will fail to interoperate. WLAN equipment is also required to be WPA2 certified (verified in another check procedure), which also provides significant interoperability assurance. The Wi-Fi Alliance WPA2 certification is not granted unless the product also has a radio subsystem compliant with the IEEE a, b, g, or n specifications. Products are tested with many other products to ensure interoperability. Compliance: Aruba is consistently active with regard to required validations and certifications for use within DoD environments. Aruba s Mobility Controllers and APs have been submitted to JITC for interoperability testing and WPA2 certification. The mobility solution has achieved a Unified Capabilities-Approved Products List certification from JITC. Information about this certification can be found at 7
8 PWR ENET 11A/N 11B/G/N PWR ENET 11A/N 11B/G/N White paper Topology diagrams Aruba Mobility Controller ClearPass Internet Facility Core Router Boundary Router Inside Firewall Outside Firewall Distribution Switches Restricted Aruba Access Point SSID: Restricted Secure Laptop User Connects to SSID: Restricted 105 SSID: Internet Gateway Commercial Mobile Device User Connects to SSID: Internet Gateway Figure 3: Network Topology WPA2 Encryption Wired Restricted Network Transport Secure Laptop SSID: Restricted 105 SSID: Internet Gateway WPA2 Encryption NAT Outer Tunnel: IPSec Contoller to Gateway Inner Tunnel: L3 GRE Controller to Gateway Commercial Mobile Device Internet Gateway Figure 4: Logical Topology 8
9 About Aruba Networks, Inc. Aruba Networks is a leading provider of next-generation network access solutions for the mobile enterprise. The company s Mobile Virtual Enterprise (MOVE) architecture unifies wired and wireless network infrastructures into one seamless access solution for corporate headquarters, mobile business professionals, remote workers and guests. This unified approach to access networks enables IT organizations and users to securely address the Bring Your Own Device (BYOD) phenomenon, dramatically improving productivity and lowering capital and operational costs. Listed on the NASDAQ and Russell 2000 Index, Aruba is based in Sunnyvale, California, and has operations throughout the Americas, Europe, Middle East, Africa and Asia Pacific regions. To learn more, visit Aruba at For real-time news updates follow Aruba on Twitter and Facebook, and for the latest technical discussions on mobility and Aruba products visit Airheads Social at Crossman Ave Sunnyvale, CA ARUBA T: FAX: [email protected] Aruba Networks, Inc. Aruba Networks, Aruba The Mobile Edge Company (stylized), Aruba Mobilty Management System, People Move. Networks Must Follow., Mobile Edge Architecture, RFProtect, Green Island, ETIPS, ClientMatch, Bluescanner and The All Wireless Workspace Is Open For Business are all Marks of Aruba Networks, Inc. in the United States and certain other countries. The preceding list may not necessarily be complete and the absence of any mark from this list does not mean that it is not an Aruba Networks, Inc. mark. All rights reserved. Aruba Networks, Inc. reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without notice. While Aruba Networks, Inc. uses commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, Aruba Networks, Inc. will assume no responsibility for any errors or omissions. WP_TIG_
Solving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i
SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab May 2013 Statement of test result confidence Aruba makes every attempt
WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B
COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B TABLE OF CONTENTS COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B NSA COMMERCIAL SOLUTION FOR CLASSIFIED
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab November 2012 Statement of test result confidence Aruba makes every attempt
White paper. A Guide to Implementing the
A Guide to Implementing the DoD Mobility Strategy Table of Contents Introduction About Aruba Networks The DoD mobility vision Deploying mobile devices within DoD policies Summary About Aruba Networks,
Aruba-Certified Design Expert (ACDX) Study Guide
Aruba-Certified Design Expert (ACDX) Study Guide Table of Contents Introduction Prerequisites for the ACDX Exam Format Software Versions Exam Deliverables Exam Equipment Scheduling and Paying for an Exam
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment
Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment Table of Contents Introduction 3 Limitations in WIDS monitoring 3 Monitoring weaknesses 3 Traffic analysis
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
ARUBA NETWORKS DESIGNS AND DELIVERS MOBILITY-DEFINED NETWORKS THAT EMPOWER A NEW GENERATION OF TECH-SAVVY USERS
CORPORATE OVERVIEW ARUBA NETWORKS DESIGNS AND DELIVERS MOBILITY-DEFINED NETWORKS THAT EMPOWER A NEW GENERATION OF TECH-SAVVY USERS who rely on their mobile devices for every aspect of work and personal
solution guide DLNA, AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS
DLNA, AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS Table of Contents Warning and Disclaimer Introduction What is Zero Configuration Networking (zeroconf)? What is DLNA? Making DLNA and Bonjour work over WLANs
PCI v2.0 Compliance for Wireless LAN
PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki
Driving Operational Efficiency: A Guide to Using AirWave Wireless Management Suite for Service Desk Troubleshooting
Driving Operational Efficiency: A Guide to Using AirWave Wireless Management Suite for Service Desk Troubleshooting Table of Contents Introduction 3 Problem #1: I can t get onto the network 4 Step 1: Has
Help Desk Guide. Enterprise Troubleshooting WLAN Issues with AirWave Wireless Management Suite
Help Desk Guide Enterprise Troubleshooting WLAN Issues with AirWave Wireless Management Suite Overview In a typical IT organization, it is the Help Desk s job to take incoming user support calls and determine
WI-FI PERFORMANCE BENCHMARK TESTING: Aruba Networks AP-225 and Cisco Aironet 3702i
WI-FI PERFORMANCE BENCHMARK TESTING: Networks AP-225 and Cisco Aironet 3702i Conducted at the Proof-of-Concept Lab January 24, 2014 Statement of Test Result Confidence makes every attempt to optimize all
ARUBA RAP-3 REMOTE ACCESS POINT
ARUBA RAP-3 REMOTE ACCESS POINT High-performance wireless and wired networking for branch offices and teleworkers The multifunctional Aruba RAP-3 delivers secure 802.11n wireless and wired network access
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
Aerohive Private PSK. solution brief
Aerohive Private PSK solution brief Table of Contents Introduction... 3 Overview of Common Methods for Wi-Fi Access... 4 Wi-Fi Access using Aerohive Private PSK... 6 Private PSK Deployments Using HiveManager...
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Palo Alto Networks User-ID Services. Unified Visitor Management
Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba
Aruba Delivers the Optimal Wireless LAN Infrastructure for High-Quality Enterprise Voice Services
Tech Brief Enterprise Aruba Delivers the Optimal Wireless LAN Infrastructure for High-Quality Enterprise Voice Services Aruba Delivers the Optimal Wireless LAN Infrastructure for High-Quality Enterprise
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security
Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy
Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy Table of Contents Introduction 3 Using AirWave RAPIDS to detect all rogues on your network 4 Rogue device
Securing Wireless LANs with LDAP
A P P L I C A T I O N N O T E Securing Wireless LANs with LDAP Many organizations have standardized on LDAP (Lightweight Directory Access Protocol) servers as a repository for their users and related security
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
The Whys and Hows of Deploying Large-Scale Campus-wide Wi-Fi Networks
The Whys and Hows of Deploying Large-Scale Campus-wide Wi-Fi Networks Table of Contents Introduction 3 The challenges: why many institutions lag in Wi-Fi deployment 3 Coverage challenges 3 Capacity limitations
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
Wi-Fi in Healthcare:
Wi-Fi in Healthcare: Security Solutions for Hospital Wi-Fi Networks Wi-Fi Alliance February 2012 The following document and the information contained herein regarding Wi-Fi Alliance programs and expected
NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Captive Portal with QR Code Copyright 2015 ZyXEL Communications Corporation Captive Portal with QR Code What is Captive Portal with QR code?
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
White Paper. Improve Air Quality by Minimizing SSIDs: Using Role-Based Access to Increase Wi-Fi Application Performance
White Paper Improve Air Quality by Minimizing SSIDs: Using Role-Based Access to Increase Wi-Fi Application Performance October 2010 Table of Contents Improve Air Quality by Minimizing SSIDs: Using Role-Based
Mobilize to Rightsize Your Network
Mobilize to Rightsize Your Network Table of Contents How enterprise mobility can reduce the total cost of network ownership by 70 percent 3 Mobility means cost savings 3 Getting started on savings 4 Make
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
THE ARUBA ADAPTIVE TRUST DEFENSE FOR SECURE ENTERPRISE MOBILITY
THE ARUBA ADAPTIVE TRUST DEFENSE FOR SECURE ENTERPRISE MOBILITY LEVERAGING REAL-TIME CONTEXT TO MITIGATE TODAY S NEW RISKS TABLE OF CONTENTS THE NEW ENTERPRISE PERIMETER THE MOBILE RISK SPECTRUM INTRODUCING
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
APPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
PCI Wireless Compliance with AirTight WIPS
A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use
Dedicated Air Monitors? You Decide.
Tech Brief Enterprise Dedicated Air Monitors? You Decide. Introduction Aruba customers commonly ask: Do I need dedicated air monitors in an Aruba deployment, or can I get by with just access points? The
Aruba Remote Access Point (RAP) Networks. Version 8
Aruba Remote Access Point (RAP) Networks Version 8 Copyright 2012 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner, For Wireless That Works, Mobile Edge Architecture,
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
10/2011 - English Edition 1. Quick Start Guide. NWA1100N-CE CloudEnabled Business N Wireless Access Point
10/2011 - English Edition 1 Quick Start Guide NWA1100N-CE CloudEnabled Business N Wireless Access Point Package Contents - 1 x ZyXEL NWA1100N-CE Access Point - 2 x Detachable Antennas - 1 x Power Adapter
WLAN Authentication and Data Privacy
WLAN Authentication and Data Privacy Digi Wi-Point 3G supports various Wi-Fi security options, including WEP-40/WEP-104 and WPA- PSK and WPA2-PSK. To configure WLAN security on DIGI WI-POINT 3G, you may
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
Cisco TrustSec How-To Guide: Guest Services
Cisco TrustSec How-To Guide: Guest Services For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
RAP Installation - Updated
RAP Installation - Updated August 01, 2012 Aruba Controller Release 6.1.3.2 The Controller has several wizards that can guide you through a variety of configuration processes. On the Configuration tab
Aruba Mobility Access Switch and Arista 7050S INTEROPERABILITY TEST RESULTS:
Aruba and INTEROPERABILITY TEST RESULTS: Aruba and Aruba and Table of Contents Executive summary 3 Scope and methodology 3 Interface connectivity 4 Port channels and link aggregation control protocol (LACP)
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
AC750 WiFi Range Extender
Model EX6100 User Manual April 2014 202-11307-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number
Deploying a Secure Wireless VoIP Solution in Healthcare
Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants
Video Conferencing and Security
Video Conferencing and Security Using the Open Internet and Encryption for Secure Video Communications & Guidelines for Selecting the Right Level of Security for Your Organization 1 Table of Contents 1.
tech note Palo Alto Networks Next- Generation Firewall and
Palo Alto Networks Next- Generation Firewall and Aruba WLAN Integration Table of Contents Overview Why is this Integration Important? Aruba Controller and Palo Alto Networks Firewall Integration Details
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
ClickShare Network Integration
ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network
LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter
LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter V2.0.0-0712 Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Network Security Best Practices
CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Penn State Wireless 2.0 and Related Services for Network Administrators
The following document provides details about the operation and configuration parameters for Penn State Wireless 2.0 and Visitor Wireless. It is intended for Penn State network administrators who are considering
D-View 7 Network Management System
Product Highlights Comprehensive Management Manage your network effectively with useful tools and features such as Batch Configuration, SNMP, and Flexible command Line Dispatch Hassle-Free Network Management
Scenario: IPsec Remote-Access VPN Configuration
CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create
How To Get A Power Station To Work With A Power Generator Without A Substation
Wi-Fi Protected Access for Protection and Automation Key Material Authentication Key Presented to: 13 December 2006 Dennis K. Holstein on behalf of CIGRE B5.22 1 The good news and the bad news Who is CIGRE
Linksys WAP300N. User Guide
User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating
ENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
ARUBA INSTANT Combining enterprise-class Wi-Fi with unmatched affordability and configuration simplicity
ARUBA INSTANT Combining enterprise-class Wi-Fi with unmatched affordability and configuration simplicity Table of Contents Introduction... 3 Aruba Instant Overview... 4 Aruba Instant APs... 4 Adaptive
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
DSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
Wi-Fi Security. More Control, Less Complexity. Private Pre-Shared Key
Wi-Fi Security More Control, Less Complexity Private Pre-Shared Key Mobility Meets Security Are the consumer devices in your environment exploding? Are your employees bringing their own devices? And has
Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business
Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
How To Use An Ipad Wireless Network (Wi Fi) With An Ipa (Wired) And An Ipat (Wired Wireless) Network (Wired Wired) At The Same Time
IdentiFiTM IDENTIFI Experience Matters IdentiFi wired-like Wi-Fi experience for the wireless world Extreme Networks IdentiFi is a purpose-built Wi-Fi solution that provides a wiredlike Wireless Local Area
User Guide. E-Series Routers
User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router
