Banning Wireless Doesn t Stop Users: Understand How to Protect Your Network and Support Wi-Fi Enthusiasts

Similar documents
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment

Enterprise A Closer Look at Wireless Intrusion Detection:

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Solving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i

Lessons in Wireless for K-12 Schools

Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy

Driving Operational Efficiency: A Guide to Using AirWave Wireless Management Suite for Service Desk Troubleshooting

Mobilize to Rightsize Your Network

Help Desk Guide. Enterprise Troubleshooting WLAN Issues with AirWave Wireless Management Suite

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Technical Brief. Wireless Intrusion Protection

QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i

Link Layer and Network Layer Security for Wireless Networks

Secure Enterprise Mobility for Government Teleworkers

Building a Wireless LAN Network

Design and Implementation Guide. Apple iphone Compatibility

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Best Practices for Outdoor Wireless Security

Protecting systems and patient privacy

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Network Design Best Practices for Deploying WLAN Switches

Palo Alto Networks User-ID Services. Unified Visitor Management

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Deploying a Secure Wireless VoIP Solution in Healthcare

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

Aruba Mobility Access Switch and Arista 7050S INTEROPERABILITY TEST RESULTS:

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

Ensuring HIPAA Compliance in Healthcare

ARUBA NETWORKS DESIGNS AND DELIVERS MOBILITY-DEFINED NETWORKS THAT EMPOWER A NEW GENERATION OF TECH-SAVVY USERS

Dedicated Air Monitors? You Decide.

Link Layer and Network Layer Security for Wireless Networks

Beyond the Firewall No. 72 March, 2012 Wireless LAN Edition

WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

How To Protect A Wireless Lan From A Rogue Access Point

Network Access Control ProCurve and Microsoft NAP Integration

Cisco Wireless Control System (WCS)

CISCO WIRELESS CONTROL SYSTEM (WCS)

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN

Solution Brief. Branch on Demand. Extending and Securing Access Across the Organization

Solution Brief. Branch on Demand. Extending and Securing Access Across the Organization

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Intelligent WLAN Controller with Advanced Functions

Wireless like Wired reliability delivered

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

CTS2134 Introduction to Networking. Module Network Security

Operating Wireless LANs for High Reliability and Performance: Six Best Practices That You Can Implement Today

Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Effective Network Access Control in a Wireless World

Ensuring HIPAA Compliance in Healthcare

WI-FI PERFORMANCE BENCHMARK TESTING: Aruba Networks AP-225 and Cisco Aironet 3702i

Evolving Network Security with the Alcatel-Lucent Access Guardian

How To Secure Your Store Data With Fortinet

Configuring Security Solutions

Best Practices for Secure Remote Access. Aventail Technical White Paper

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

Network Access Control in Virtual Environments. Technical Note

The Whys and Hows of Deploying Large-Scale Campus-wide Wi-Fi Networks

Best Practices in Deploying a Secure Wireless Network

Aruba Delivers the Optimal Wireless LAN Infrastructure for High-Quality Enterprise Voice Services

CUTTING THE CORD BY MOVING TO.11AC SAVES WEST CHESTER OVER $1M

BYOD: BRING YOUR OWN DEVICE.

Using Wireless Mesh Networks for Video Surveillance Version: 1. Using Wireless Mesh Networks for Video Surveillance

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Recommended IP Telephony Architecture

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Securing the University Network

March

Meru MobileFLEX Architecture

Sarbanes-Oxley Compliance and Wireless LAN Security

Secure Mobility. Solutions Family. Delivering trust and simplicity in a complex wireless world.

Connect Every K-12 Laptop... Wirelessly, Effortlessly, Securely

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

Introduction of Intrusion Detection Systems

Best practices for WiFi in K-12 schools

Achieving PCI-Compliance through Cyberoam

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

WHITE PAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

SOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Rethinking Remote Access: Pervasive Enterprise Mobility Using Remote Access Points

Primary and Secondary Education Best Practices

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Network Access Control for Mobile Networks

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Securing Physical and Virtual IT Assets Without Hardware Firewalls or VLANs

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Meru MobileFLEX Architecture

WLAN Security Networking with Confidence

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

FDIC Division of Supervision and Consumer Protection

Cisco Virtual Office Express

Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. Get Started Now: to learn more.

Transcription:

Banning Wireless Doesn t Stop Users: Understand How to Protect Your Network and Support Wi-Fi Enthusiasts

Table of Contents Introduction 3 Implementing no wireless 3 No wireless policies without enforcement don t work 3 Progressing from no-wireless to secure wireless mobility 6 Provide secure guest access 6 Implement time-of-day or location restrictions 7 Limit users and devices to specific applications 7 Implement strict firewall enforced user policies 8 Conclusion 9 About Aruba Networks, Inc. 10 Aruba Networks, Inc. 2

Introduction Despite great strides in wireless LAN (WLAN) technology, many organizations continue to choose a nowireless policy, meaning wireless deployments of any kind are expressly prohibited by organizational guidelines. The basic goal is to eliminate any occurrence of wireless access, sanctioned or unsanctioned, within a defined space or location. The rationale for such a policy can vary, ranging from security concerns to a perception of operational complexity and prohibitive costs. However, in the quest to shut wireless out completely, two issues have arisen. First, many organizations do not consider the infrastructure requirements necessary to effectively enforce a no wireless policy. It is incorrect to assume that wireless threats will not exist simply because there is a no wireless policy and no ITimplemented wireless deployment. In fact, it is likely that wireless-related threats will always exist, regardless of the network design or internal mandates. Second, many organizations have become myopic in their quest for no wireless. These organizations may not realize that, as wireless equipment has matured, the options for deploying secure network mobility have expanded. The options are no longer limited to a binary decision of allowing or disallowing WLAN access. A range of controlled, restricted wireless policies that fall in between open-wireless and no wireless are now possible. Implementing no wireless Organizations have spent years and millions of dollars building moats around their computing infrastructure to protect it from the outside world. More recently, however, concerns have surfaced around internal threats, where legitimate users compromise the integrity of the network or gain access to privileged confidential data. Trusted individual clients are often the most overlooked aspect of network security. Add wireless to the equation and it can exacerbate this security hole unless a well thought out plan is in place. A simple laptop with an embedded wireless network interface card (NIC) connected to the organization s infrastructure could expose intellectual capital in ways that a non-wireless client would not. Unauthorized access points also pose a threat, even when they are deployed in a non-malicious manner. No wireless policies without enforcement don t work Though well intentioned, no wireless policies are often poorly implemented. In the worst case, organizations simply publish guidelines and prohibit IT from deploying WLAN equipment. The hope is that this will protect the organization from wireless-related attacks. Some organizations take a slightly more proactive approach, using periodic walk-through assessments that can report on malicious wireless activity. However, this method only offers a snapshot of the RF environment and is far from a comprehensive no wireless policy enforcement. Both approaches underestimate the wireless threats that can surface in a wired environment, even when wireless installments are prohibited. Organizations that take this tack will quickly realize the decision to implement a no wireless policy requires a full evaluation of associated security threats, clearly stated expectations of such a policy, and the infrastructure required to enforce it. These organizations will find that the only way to validate the absence of unauthorized WLANs and mitigate wireless threats is to deploy a best-in-class WLAN system which, at a minimum, must be able to perform the following functions: Aruba Networks, Inc. 3

Prohibit rogue APs The solution must prevent any employee from installing rouge Access Points (APs) within the confines of a protected organization. Whether a network is wireless-enabled or not, rogue APs are one of the greatest threats to network security today. One employee with a $50 access point from a home electronics store can single-handedly open up the entire security perimeter, allowing anyone with a laptop and a wireless card free access to the internal network. Installing a system to automatically locate and disable rogue APs is an essential part of any security strategy especially for enterprises choosing not to deploy wireless at all. However, it is not enough to detect rouges. A complete solution must identify and disable rogue APs, both on the wire and in the air, so that no clients will be able to communicate through them. Network planners must be very careful when looking for systems to identify rogue APs. There are two varieties: those that classify and those that do not. Systems that classify are able to automatically determine if an AP seen over the air is actually connected to the network or not. The end result is 100% certainty that what is flagged as a rogue AP is a genuine threat to the network. Upon identifying a threat, an effective system must automatically disable the rogue AP, preventing any clients from associating with it. Finally, network planners should choose a system that provides location tracking and real-time graphical views so the rouge AP can be quickly found and removed from the network. Figure 1. Rogue location tracking Less sophisticated systems flag everything seen over the air as rogue and leave the rest of the work to the network staff. An IT administrator must then associate with each rouge, try to figure out what network it is attached to, try to locate it, determine if it is a rouge, and then manually tell the system to shut it down. With so much room for error, it is easy for an administrator to either miss a real security threat or erroneously shut down a neighbor s AP. At the end of the day, this type of system is almost like having no system at all. Aruba Networks, Inc. 4

Prohibit ad-hoc 802.11 The solution must prevent all ad-hoc 802.11-based WLAN networks from occurring within the confines of a protected organization. Ad-hoc networks uncontrolled WLANs operating only between clients, with no AP in the middle constitute another class of rogue. The greatest danger posed by ad-hoc networking is a computing device running in ad-hoc mode while simultaneously connected to a wired LAN. Such a client can easily be compromised as an unauthorized entry point into the wired network, jeopardizing the company s protected resources. Ad-hoc networks are particularly dangerous because anyone can join them there is no authentication required, and typically no encryption is used. In an enforced no-wireless network, ad-hoc-enabled clients must be actively detected and disabled. A system that offers comprehensive RF monitoring can perform these functions by actively disrupting ad-hoc clients, as well as any clients attempting to associate with them, with de-authentication frames. This ensures that even if a device enabled for ad-hoc networking is connected to the network, it is rendered harmless. In turn, the RF monitoring system should send an alert to the network administrator so ad-hoc networking can be disabled on the violating client. Prohibit client bridging A solution must give administrators visibility into misconfigured clients that are connected to the wired Ethernet network and are bridging their wired interface to a wireless connection. When bridging is enabled between two interfaces on a client, that client effectively becomes a rogue AP. A client configured as a bridge can inadvertently bridge two internal networks creating a network loop. Worse, in a no wireless environment, a client bridging an outside wireless network to an internal wired network represents a security hole. Public Network Internal Network Bridge Windows XP Laptop Figure 2. Client bridging An effective solution must implement advanced RF security to automatically detect wireless bridges, notify network administrators of their existence, and identify the location of the offending client on a building map. Aruba Networks, Inc. 5

Avoid disrupting other networks A solution must prevent clients within the protected RF space from connecting to other organizations access points without disabling the operation of the other organizations access points or clients. Access points and clients at neighboring companies and hotspots aren t harmful, but clients within a no wireless environment should be prevented from connecting to them. This must be achieved without hindering the operation of the neighboring networks and devices. An effective solution should automatically classify neighboring APs as interfering, not rogue, and prevent no wireless clients from associating with them. This function can be accomplished with a combination of location-based services, client registration, and the same type of disruption methods used to prevent clients from attaching to rogue APs. Progressing from no-wireless to secure wireless mobility Most organizations recognize the benefits of user mobility, including productivity gains and the cost savings of overlaying convergence applications such as voice on a WLAN infrastructure. Concerns associated with wireless access have ebbed as security advancements have progressed, and many now consider wireless access to be more secure than the wired LAN. Wireless equipment compatible with 802.11i and the related WPA (Wi-Fi Protected Access) and WPA2 certifications provides rock-solid security without complicating the user experience. Some wireless equipment even complies with the stringent requirements of the U.S. government s FIPS standards. Deployment of a WLAN solution has been greatly simplified as well. Early wireless implementations used distributed fat access points that were excessively difficult to deploy and manage. Even early centralized deployments were complex, requiring substantial hardware and software upgrades, as well as cumbersome reconfiguration to the existing network infrastructure. Additionally, the existing VLAN structure had to be greatly extended to accommodate the WLAN, adding significant complexity. It s now clear that the risk of destabilizing the core network infrastructure to deploy a new service far outweighs the advantages. Next-generation wireless solutions now available eliminate these issues. These WLAN solutions are deployed as a simple overlay on top of the existing network without requiring upgrades or reconfiguration. Now mobility can be easily added as a new service, much like an additional server, without requiring any knowledge of or changes to the network to accommodate it. Because the underpinnings of an enforceable, comprehensive no wireless policy must include core components of an advanced WLAN infrastructure, it is relatively simple to incrementally enable mobility. In most cases, it s simply a matter of adding APs to provide coverage or repurposing APs that were dedicated to RF monitoring to also provide client access. As wireless security and deployment concerns are addressed, organizations are beginning take advantage of the benefits associated with wireless mobility. A few examples are provided below. Provide secure guest access The first step for many organizations is to deploy dedicated wireless guest access, effectively treating wireless as an untrusted network. Organizations are under increasing pressure to provide wireless guest access, enabling visitors to perform their jobs and gain instant access to timely business information. Wireless guest access can be easily configured to protect internal network resources and even provide auditing of guest activity. Aruba Networks, Inc. 6

The impact on security and manageability should be negligible in moving from no-wireless to wireless guest access only. A guest access solution should not compromise the security of the network in any way and should not place excessive burden on the IT staff. In order to achieve this, the solution must include the following: Secure Web Access Client devices must be blocked from all access until a web browser is opened and authentication credentials are entered. The exchange of authentication credentials can be secured using industry-standard SSL. Mandatory acceptance of custom usage policies and guidelines can be required as part of the authentication process. Firewalled Traffic Separation A fundamental weakness in early guest access implementations was the reliance on VLANs for separating users. VLANs have proven unreliable in keeping users isolated and fully protected from one another. User-based policy enforcement must be done with an integrated firewall for maximum security. Role-based Guest Provisioning A role-based guest provisioning system enables secure and simple provisioning of guest users through a web browser interface. A receptionist can use such an interface to easily add, delete and modify guest user accounts, configuring each with an expiration date and time. Secure Tunnel Redirection Some advanced WLAN solutions allow guest traffic to be redirected to an IPSec or GRE tunnel for transport to another device located outside the corporate firewall. Using secure tunnel redirection, guest traffic is completely prevented from traversing any portion of the internal network, blocking any attempts to use crafted packets or VLAN hopping attacks. Non-Disruptive Deployment The existing network should be considered a no-touch zone, allowing for rapid on-demand deployment. Wireless devices should securely communicate with each other over IP networks. No reconfiguration of closet switches, routers, VLANs, or ports is required if the right solution is chosen. Reporting The system should provide auditing and reporting of who is using the network, when it is being used, and how it is being used. Limited usage A wireless guest access solution should allow the organization to limit guest access by protocol, thus restricting the type of traffic a guest user can send or receive. Restrictions should be able to be configured based on TCP port range, UDP port range, service type (e.g., HTTPS), and other Layer 4 protocols beyond TCP/UDP. Implement time-of-day or location restrictions In many cases, organizations find that the next step from a no wireless policy is secure wireless access restricted by time of the day and location. One of the operational benefits of a wired network is that access is only granted as long as the building is physically open. Some WLAN solutions available today provide the equivalent benefit with configuration options to turn an AP or group of APs off during certain time periods (e.g., overnight). This limits exposure to the wireless network and ensures that IT staff is always present to address issues as they arise Centralized WLAN systems with integrated firewalls can provide additional granularity by limiting WLAN access to certain users based on both time of day and location. This can be useful in developing access tiers for different groups of users. Limit users and devices to specific applications Another incremental step forward from a no wireless policy is to restrict users or devices to specific applications. Wireless solutions that include stateful firewalls can implement rules to match protocol, IP address and applications such as FTP, SIP, etc. Once application flows have been identified by the firewall, standard firewall actions such as permit, drop, log, or reject can be applied. Aruba Networks, Inc. 7

A stateful firewall is especially useful in securing and optimizing Voice over IP over WLAN (VoWLAN) networks through stateful recognition of traffic flows (e.g., SIP, H.323). Based on IP address, protocol and application information in the control channel, the firewall can selectively open ports for calls. This capability can prevent VoIP traffic from becoming a backdoor mechanism to attack the internal network Rules on the stateful firewall can also provide bandwidth controls on per-role basis (e.g., guests can be limited to specific throughput levels) to provide Quality of Service and prevent VoIP traffic from being overrun by data. Application-based prioritization requires stateful inspection, and this capability is a crucial difference between competing wireless solutions. Another powerful feature of advanced WLAN systems with a stateful firewall is blacklisting, where the administrator can automatically blacklist or block from all network access any client that violates specific firewall rules. This is particularly useful when single-purpose devices, such as voice over IP handsets, are used. For example, if a voice handset is observed attempting to conduct database queries or file server browsing, it is likely that the device credentials have been compromised by an intruder. Automatic blacklisting immediately disconnects the device from the network and generates an alert message to the administrator. Implement strict firewall enforced user policies An identity-based wireless solution that integrates encryption, authentication and access control into a single device can offer all the benefits of advanced mobility with a security level comparable to a network that fully enforces no-wireless. Because wireless devices authenticate to the network, identity is learned. Because encryption from those wireless devices terminates centrally, the system can ensure that network traffic was not forged by an intruder or tampered with in transit. Finally, if access control is done through a firewall, policy can be tightly tied to the identity and role of the user rather than to an arbitrary parameter such as IP address. This means that even a malicious insider cannot alter a MAC or IP address to become someone else; access control decisions are made on the basis of user identity, not network address. Wired desktop Access Controller Wireless laptop Access Point Identification Encryption Authentication Authorization Figure 3. Centralized authentication, authorization and encryption Aruba Networks, Inc. 8

Traditional fixed networks can only apply access rights to ports or VLANs. Mobile users and devices, by definition, do not connect to the network through a fixed port. The network must therefore identify every user and device that joins the network. A centralized wireless solution with an integrated firewall has the ability to be identity-aware and make permit/ deny decisions based on the identity of the user or device Once the role of the user is determined, appropriate rules may be applied that control what that user or device is permitted to do on the network. Conclusion Many organizations will continue to choose a strict no wireless policy in their network. It is critical that these organizations conduct a full assessment of the risks associated with this decision. Even with a no wireless policy, an advanced next-generation WLAN infrastructure has become a mandatory requirement to detect and mitigate wireless attacks. Advanced WLAN solutions provide much greater security whether deploying no wireless or adding some level of mobility. The figure below shows the relative level of security between deploying a next-generation WLAN infrastructure that enforces no wireless policies (upper curve), and a deployment that fails to properly enforce a no wireless policy or implements mobility with a legacy WLAN solution (lower curve). The overlaid benefit curve shows how improved network functionality and well-implemented security can greatly increase user productivity. Figure 4. Balancing security against the benefits of wireless Technology advancements now make it simple for organizations to deploy the infrastructure necessary to initially enforce no wireless policies and then take incremental steps towards providing advanced mobility, all without compromising security or adding network complexity. The key here is that a next-generation WLAN solution is essential to maintain stronger security both when there is a no wireless policy and when advanced mobility is added to realize greater user productivity benefits. Aruba Networks, Inc. 9

About Aruba Networks, Inc. Aruba Networks is a leading provider of next-generation network access solutions for the mobile enterprise. The company s Mobile Virtual Enterprise (MOVE) architecture unifies wired and wireless network infrastructures into one seamless access solution for corporate headquarters, mobile business professionals, remote workers and guests. This unified approach to access networks enables IT organizations and users to securely address the Bring Your Own Device (BYOD) phenomenon, dramatically improving productivity and lowering capital and operational costs. Listed on the NASDAQ and Russell 2000 Index, Aruba is based in Sunnyvale, California, and has operations throughout the Americas, Europe, Middle East, Africa and Asia Pacific regions. To learn more, visit Aruba at http://www.arubanetworks.com. For real-time news updates follow Aruba on Twitter and Facebook, and for the latest technical discussions on mobility and Aruba products visit Airheads Social at http://community. arubanetworks.com. www.arubanetworks.com 1344 Crossman Avenue. Sunnyvale, CA 94089 1-866-55-ARUBA Tel. +1 408.227.4500 Fax. +1 408.227.4550 info@arubanetworks.com 2013 Aruba Networks, Inc. Aruba Networks trademarks include AirWave, Aruba Networks, Aruba Wireless Networks, the registered Aruba the Mobile Edge Company logo, Aruba Mobility Management System, Mobile Edge Architecture, People Move. Networks Must Follow, RFProtect, and Green Island. All rights reserved. All other trademarks are the property of their respective owners. WP_BanningWLAN_01XX13