How To Secure A Wireless Network With A Wireless Device (Mb8000)



Similar documents
WLAN Authentication and Data Privacy

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Setting up a WiFi Network (WLAN)

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address

9 Simple steps to secure your Wi-Fi Network.

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October Last updated: 11 October Rev: 1.

Setting up Windows XP for WPA Wireless Access (ISU-OIT-WPA)

Chapter 2 Configuring Your Wireless Network and Security Settings

Configuring Security Solutions

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

The next generation of knowledge and expertise Wireless Security Basics

ALL Mbits Powerline WLAN N Access Point. User s Manual

WLAN Information Security Best Practice Document

Securing your Linksys WRT54G

WIRELESS SETUP FOR WINDOWS 7

Step-by-Step Secure Wireless for Home / Small Office and Small Organizations

CONNECTING THE RASPBERRY PI TO A NETWORK

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

Question How do I access the router s web-based setup page? Answer

Enterprise Solutions for Wireless LAN Security Wi-Fi Alliance February 6, 2003

Using Microsoft Vista and Windows XP to Manage Wireless Network Connections

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Wireless Network Configuration Guide

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

STEP III: Enable the Wireless Network Card

Configure WorkGroup Bridge on the WAP131 Access Point

P r o t o l ck w fi ma a n ger User s Guide

How To Set Up Isu-Oit-Wpa On Windows 7 For Wireless Access (Isu- Oit- Wpa) On A Pc Or Mac Or Ipa (Windows 7) On An Ipa Or Ipac (Windows

Design and Implementation Guide. Apple iphone Compatibility

Chapter 3 Safeguarding Your Network

Configuring Routers and Their Settings

The back story of our Wireless (reading will help you understand what is going on in the building):

Chapter 2 Wireless Settings and Security

Top 10 Security Checklist for SOHO Wireless LANs

Implementing Security for Wireless Networks

How To Protect A Wireless Lan From A Rogue Access Point

Eduroam wireless network Windows Vista

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server

Seamless and Secure Access (SSA) Manual Configuration Guide for Windows 7

Mac OS X Secure Wireless Setup Guide

Using LAN Wi-Fi (WLAN) 3-2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) 3-3 Connecting Windows 3-5 Connecting Mac 3-8

Eduroam wireless network Apple Mac OSX 10.4

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Wi- Fi settings for Windows XP

How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall:

DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245

Eduroam wireless network - Windows 7

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server

Network User s Guide

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

USER GUIDE Cisco Small Business

HUAWEI HG256s. Home Gateway Quick Start

Certified Wireless Security Professional (CWSP) Course Overview

Product Specifications

Security. TestOut Modules

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

Developing Network Security Strategies

Eduroam wireless network Apple Mac OSX 10.5

DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256

User Guide for eduroam

Link Layer and Network Layer Security for Wireless Networks

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :

Abstract. Avaya Solution & Interoperability Test Lab

Network User s Guide

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server

Wireless Security for Hotspots & Home PCCW Feb, 2009

Network Services One Washington Square, San Jose, CA

Internet access system through the Wireless Network of the University of Bologna (last update )

VLANs. Application Note

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Chapter 2 Wireless Networking Basics

Web Authentication Application Note


FD Wi-Fi Terminals. FD100 Ti /200 Ti /300 Ti Quick set-up Guide

Setting Up Your Wireless Network

Setting up SJUMobile (Wireless Internet Access for personal devices)

Recommended Wireless Local Area Network Architecture

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

WIRELESS SECURITY IN (WI-FI ) NETWORKS

Aerohive Private PSK. solution brief

Top 10 Security Checklist for SOHO Wireless LANs

Self Help Guide. Enable wireless and wireless security on your Belkin VoIP modem/router.

Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

RSC-Secure-Wireless provides...

Instructions for connecting to winthropsecure. Windows 7/8 Quick Connect Windows 7/8 Manual Wireless Set Up Apple Quick Connect Apple Settings Check

Computer Networks. Secure Systems

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

How to Connect to UAB s Wireless Networks

The Importance of Wireless Security

Wireless Security for Mobile Computers

TL-WN422G High-Power Wireless USB Adapter

Transcription:

MB8000 Network Security and Access Control Overview MB8000 employs almost all of the current popular WLAN security mechanisms. These include wireless-user isolation, closed system (by turning off SSID broadcasting), MAC filtering, WEP encryption, WPA-PSK (TKIP) encryption. If you have your own RADIUS scheme deployed, you can also use IEEE 802.1x, WEB Portal, WPA and RADIUS MAC for access control. Also, you can combine two or several of these security mechanisms for your MB8000 deployment. 1. Wireless-User Isolation Wireless-user isolation, also known as the layer 2 isolation, is a security mechanism defined by IEEE802.11 standard. MB8000 adheres to this standard. When the layer 2 isolation is enabled, the wireless stations that associated with the access point (here is MB8000) CANNOT access each other by Wi-Fi. This provides a useful security for the users in the wireless hot spots. To configure MB8000 to work in layer 2 isolation, you may login to its WEB page and go to Basic -> WLAN Card page. And then set IBSS Relay Status field to Disable. As depicted in figure 1 below: Figure 1. Layer 2 isolation.

2. Closed System When the SSID broadcasting is turned off, your network is closed to the strangers. A wireless station can only associate with MB8000 with the exactly SSID. To do this on MB8000, please browse MB8000 s configuration WEB page and go to Basic -> WLAN Card page. Find Closed System Status field on this page and set it to Enable by clicking the drop list. Show as figure 2. Figure 2. To turn off SSID broadcasting. It is a fairly weak method for a wireless network security by just only turning off SSID broadcasting. Hackers can use 802.11 analysis tools (e.g. Airopeek or Netstumbler) to find out the SSID even through the SSID broadcasting is turned off, because the SSID is still presented in the 802.11 association request frames. The hackers just need to wait for an authentic wireless station associates with the network. 3. MAC filtering Mb8000 offers a mechanism for MAC filtering. There is a MAC address table (so called MAC Access Table ) contained in MB8000. Each entry in this table belongs to a wireless client (WLAN card). And there are two filtering policies for the wireless clients that listed on this table: Allow or Deny. When the filtering policy is set to Allow, then only the wireless clients that listed on this table can connect to MB8000 to access the Internet through this MB8000 unit. Any other wireless clients cannot gain the access authorization.

And vice versa, when the filtering policy is set to Deny, MB8000 will prevent the listed wireless clients from connecting. It is something like a Black List in this case. To enable, disable MAC filtering status, or to configure the filtering policy, as well as to add, delete or edit the MAC addresses to the MAC Access Table, please browse Advanced -> Filters page. Figure 3 shows a sample configuration on the Allow policy. Figure 3. A sample configuration for allowed MACs. First of all, you need to enable the MAC filtering by selecting Enable on the drop list for MAC Access Control Status field, and then set the filtering policy to Allow. Click OK to save the changes, and then click Add to add a new MAC address to the MAC Access Table. You can also edit or delete an existed entry by clicking Edit. To delete an entry from the table, please Edit and then set the EntryStatus to Deleted. As depicted in figure 4. Figure 4. To delete an MAC address entry. Figure 5 shows a sample configuration on the Deny policy.

Figure 5. A sample configuration for denied MACs. It is a fairly good scheme to apply MAC filtering on a small wireless network for small companies or SOHO users. But when more and more users are added or more MB8000s are deployed, it is a nightmare for the network administrator to maintain such a table for MAC addresses. Because he must manually add a new MAC entry to the table on each MB8000 once a new user is added or delete one when a user leaves or his wireless card lost. MB8000 provides a centralized MAC filtering mechanism to address this issue, which is so-called RADIUS MAC authentication in MB8000. Please reference to Application Note for RADIUS MAC.pdf for more detail. 4. WEP Encryption WEP (Wired Equivalent Privacy) is introduced to IEEE 802.11 networks, which encrypts the payload in the 802.11 frames. The WEP key is also used to authenticate a wireless station which tries to associate with the access point (here it means MB8000). When WEP key is used to authenticate the wireless station, only the wireless stations with the exactly WEP keys can associate with the access point. Thus the strangers will be kept out. The WEP encryption is supposed to keep hackers or eavesdroppers from viewing sensitive emails, usernames and passwords, etc. It was proven that a person can easily decode WEP-Encrypted information after monitoring an active network for less than one day and then he can access your network also. As an expert in WLAN security, does not advise you rely on WEP for protecting your sensitive information. However, WEP security mechanism is better than no encryption at all, especially for the people who just want to keep out the passive eavesdroppers.

To configure WEP security mechanism on MB8000, please reference to Application Note for MB8000 WEP Encryption.pdf for more detail. 5. WPA and WPA-PSK As we already known, WEP is inadequate for securing wireless network. WPA (Wi-Fi Protected Access) is raised by Wi-Fi Alliance in 2003 to address to the security issues on wireless network. WPA utilizes TKIP (Temporal Key Integrity Protocol) on data encryption to address to the WEP s vulnerability. And also, IEEE 802.1X is introduced to WPA for the enterprise users who have their authentication server (such as RADIUS) deployed. With 802.1X, TLS/TTLS/PEAP can be used for authentication. For the small firm or home/soho users, WPA defines a brief mode without authentication server deployment. In this mode, a Pre-Shared Key (PSK) is used to authenticate users. With WPA deployed, users can connect to the wireless network only after they pass the IEEE802.1X authentication with their credentials. And with WPA-PSK, only the users who owes the exactly PSK could be able to connect to the wireless network. What s more, Microsoft Windows XP with SP2 offers official standard WPA/WPA-PSK client software, so the users needn t install any extra software on their computers. MB8000 adheres to WPA specification to enhance the security on WLAN. And WPA/WPA-PSK is recommended by, especially for the enterprise users. Please reference to Application Note for MB8000 WPA.pdf for more detail configuration. 6. WEB Portal WPA and WPA-PSK is a wonderful solution for the wireless network security. But for the Wi-Fi hot spots deployment, it may lead to a lot of inconvenience for the hot spot users, as well as a lot of requests for technical support from their customers. MB8000 also provides a mechanism for access control, which is WEB Portal. With WEB Portal deployed, a user cannot access the Internet through MB8000 before he passes the authentication. When an unauthenticated user tries to browse the Internet, he will be redirected to a login page. He MUST input his proper username and the password to pass the authentication. For the small firm without RADIUS service deployed, MB8000 provides a local user table on itself. The administrator can add, edit or delete user entries on this table. When a user tries to login with his username and password, MB8000 will look up this table to verify that. For the operators and ISPs with RADIUS service deployed, MB8000 adheres to the RADIUS protocol for user authentication as well as accounting. In this case, the username and password will be authenticated by the remote RADIUS server. For detail configuration, please reference to Application Note for WEB Portal.pdf.

ADDR:21072 Bake Parkway Suite 106 Lake Forest, CA 92630 TOP Global Technology Ltd. TEL: 949-586-7046 FAX: 949-380-4128 http://www.topglobalusa.com/