Wireless Technology Seminar



Similar documents
The following chart provides the breakdown of exam as to the weight of each section of the exam.

Certified Wireless Security Professional (CWSP) Course Overview

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

WIRELESS NETWORK SECURITY

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Authentication in WLAN

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Particularities of security design for wireless networks in small and medium business (SMB)

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Security in IEEE WLANs

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

CS 356 Lecture 29 Wireless Security. Spring 2013

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Wi-Fi in Healthcare:

IEEE Wireless LAN Security Overview

Chapter 2 Wireless Networking Basics

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Wireless Security for Mobile Computers

Implementing Security for Wireless Networks

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Lecture 3. WPA and i

How To Protect A Wireless Lan From A Rogue Access Point

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Optimizing Converged Cisco Networks (ONT)

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Wireless security. Any station within range of the RF receives data Two security mechanism

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

How To Secure Wireless Networks

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Configuring Security Solutions

Wireless Network Standard and Guidelines

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

ALL Mbits Powerline WLAN N Access Point. User s Manual

1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & b up to 108 Mbps) User Manual. Version: 1.

HP E-M110 Access Point Series. Product overview. Key features. Data sheet

Configure WorkGroup Bridge on the WAP131 Access Point

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

Wireless LAN Access Control and Authentication

CS549: Cryptography and Network Security

How To Manage An Wireless Network At A University

Developing Network Security Strategies

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

WIRELESS SECURITY IN (WI-FI ) NETWORKS

The Importance of Wireless Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

MSC-131. Design and Deploy AirDefense Solutions Exam.

CISCO WIRELESS SECURITY SUITE

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Wireless Pre-Shared Key Cracking (WPA, WPA2)

chap18.wireless Network Security

The next generation of knowledge and expertise Wireless Security Basics

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Design Guide for Pervasive Wireless Networks

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

vwlan External RADIUS 802.1x Authentication

Advanced Security Issues in Wireless Networks

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

Configuration of Cisco Autonomous Access Point with 802.1x Authentication for Avaya 3631 Wireless Telephone

Beyond Retail: The Imperative for Ubiquitous Security in Wireless Printers

WIRELESS LAN SECURITY FUNDAMENTALS

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Closing Wireless Loopholes for PCI Compliance and Security

Apple AirPort Networks

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Cisco SAFE: Wireless LAN Security in Depth

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

A White Paper from Laird Technologies

The Value of Cisco Compatible Extensions (CCX) for Philips PageWriter Cardiographs

WIRELESS NETWORKING SECURITY

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

The 802.1x specification

Wi-Fi Client Device Security and Compliance with PCI DSS

APPENDIX 3 LOT 3: WIRELESS NETWORK

Chapter 6 CDMA/802.11i

Transcription:

Wireless Technology Seminar

Introduction Adam Worthington Network Consultant Adam.Worthington@euroele.com

Wireless LAN Why? Flexible network access for your users? Guest internet access? VoWIP? RFID?

Available Wireless LAN Technologies

802.11b First widely adopted commercially available 802.11 wireless technology Data rates up to 11mbps. Operates in 2.4Ghz waveband 3 non-overlapping channels Good Signal Propagation

802.11g Backward compatible with 802.11b Data rates up to 54Mbps Operates in 2.4Ghz waveband 3 non-overlapping channels Good signal propagation

802.11a Least adopted of the three standards in the UK Data rates up to 54Mbps Operates in the cleaner 5Ghz waveband 8 non-overlapping channels Worst signal propagation

802.11: Emerging Standards 802.11e - Enhancements: QoS, including packet bursting 802.11i - Enhanced security (WPA2)

WLAN Solution: What Should It Provide A Wireless LAN Solution Should: Authenticate devices/users Encrypt data Ensure data integrity Allow guest access Plan and manage RF coverage Detect ad hoc or rogue users Identify rogue APs Protect against and locate the source of DoS and manin-the-middle attacks

Different Wireless Solution Types Standalone (FAT) AP Appliance/VPN Solution Wireless LAN Switch/Controller

Standalone AP Cisco, 3com, Proxim Good, Flexible Feature Set Highest Management Overhead Worst physical security Requires additional management software/appliance for network RF awareness

Appliance/VPN Solution Vernier/HP, Cisco Central security management Excellent IP layer security Good physical security Limited support for Broadcast/Multicast/non- IP No concept of RF. Channel, power and layer 2 security must be managed on AP, possibly assisted by external management software.

Wireless LAN Switch/Controller Solution Cisco, Trapeze/3com, Aruba Central security and RF management Excellent wireless security Good physical security Best RF control e.g. dynamic power and channel allocation Support for advanced wireless technologies e.g. RFID

WLAN Security: Levels of protection Authentication Data Origin Protection Data Integrity Protection Confidentiality

802.11i: Security For The Air IEEE 802.11i (WPA2) defines a new type of wireless network called a robust security network (RSN). Strong authentication: 802.1x Strong encryption: TKIP and AES

802.1x Authentication Supplicant Authenticator Authentication Server

802.1x and EAP Originally defined for use with PPP Truly Extensible, does not force users into certain types of authentication.

802.1x: Initial Connection Client AP Client scans the air looking for a network Client joins one of the networks and performs open-system Authentication Client sends association request Access Point sends client association ID Start 802.1x authentication (EAP over LAN, Start) Access Point queries who are you?

EAP: Which Type? EAP-TLS PEAP/MS-CHAPv2 EAP-TTLS

Client PEAP Stage 1: TLS Handshake AP RADIUS Server Hi I m Adam, here s my Network Access Identity (NAI, includes my username, my random number and a list of cryptographic algorithms I support). AP forwards Radius Access Request with NAI Got it. I ll decrypt the pre-master secret with my private key. I ll derive the keying material. It s the same as your keying material. Now we can bidirectionally encrypt and integrity check the session. Okay, here s my random number. I ve looked at your list and we ll use 128- bit RC4 encryption and MD5 message integrity checking. I ll also send you my certificate. Okay, I ve checked your certificate and you re authenticated. Now I ll generate and send you the premaster secret encrypted with your public key. With this we can each derive keying material to be used to encrypt this TLS session.

Client PEAP Stage 2: MS-CHAPv2 Authentication AP RADIUS Server Who are you? I ve told you once I m Adam. Okay, I ll use my password and a hash function to create a response to your challenge. I ve also got a challenge for you. Okay, I m RADIUS1. We ll use MS- CHAPv2 for authentication, here s a challenge for you. I m happy with your response to my challenge, here s a response to your challenge. I m happy with your response to my challenge, AP, let s talk. RADIUS server sends the access point a RADIUS accept message including any configured authorisation attributes (VLAN ID etc.) Authentication complete

Encryption 802.11i (also known as WPA2) using counter-mode/cbc-mac protocol (CCMP) Wi-Fi Protected Access (WPA) using TKIP Dynamic WEP Dynamic WEP with Broadcast/Multicast Key Rotation

Pre 802.11i Roaming Hand off Discovery phase Association (or re-association) with second AP requires full EAP exchange Total time to associate hundreds of milliseconds

802.11i Fast Handoff Hand off Discovery phase Association (or re-association) PMK Cached, straight to four-way handshake Total time to associate tens of milliseconds

Rogue Users and AP s Types of rogue Employee installed unsanctioned AP Employee AD-HOC network Unauthorised intruder or hacker Bug-light AP

Employee Installed Unsanctioned AP Unsanctioned AP Corporate Network Wireless Client

Employee AD-HOC network Corporate Network

Unauthorised Intruder or Hacker They don t all use Pringles cans!

Bug-Light AP Rogue PEAP With Network Stage 12 Access Rogue AP Legitimate AP Legitimate Client RADIUS Server

Rogue Detection and Location Manual detection: IT Manager with Airmagnet, AiroPeek, Sniffer Wireless etc. Wireless IDS: AirDefense etc. Solution integrated with wireless LAN: Cisco, Trapeze etc.

To Catch a Rogue Detection Location Action

How These Concepts May Apply to Your WLAN Guest internet access provided by FroDo Web-AUTH solution Unit LAN access managed locally and secured by WPA2

Bridging Access Point Sample Topology Bridging Access Point PC PC PC Switch Supporting Multiple VLANs Wireless Switch FroDo University backbone network Main Unit VLAN FroDo Guest Wireless VLAN VLAN Trunk Carrying All VLANs Wireless Hardware VLAN

Conclusion Security is key Many options, choose the one that fits best.