Implementing Security for Wireless Networks



Similar documents
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

ClickShare Network Integration

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Certified Wireless Security Professional (CWSP) Course Overview

Step-by-Step Secure Wireless for Home / Small Office and Small Organizations

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Particularities of security design for wireless networks in small and medium business (SMB)

vwlan External RADIUS 802.1x Authentication

Chapter 3 Safeguarding Your Network

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

The next generation of knowledge and expertise Wireless Security Basics

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

WLAN Authentication and Data Privacy

Deployment of IEEE 802.1X for Wired Networks Using Microsoft Windows

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

9 Simple steps to secure your Wi-Fi Network.

How To Secure Wireless Networks

The back story of our Wireless (reading will help you understand what is going on in the building):

Chapter 2 Wireless Settings and Security

Wireless Technology Seminar

WIRELESS SECURITY IN (WI-FI ) NETWORKS

Huawei WLAN Authentication and Encryption

Recommended Wireless Local Area Network Architecture

How To Secure A Wireless Network With A Wireless Device (Mb8000)

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Chapter 2 Configuring Your Wireless Network and Security Settings

DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

Securing Wireless LANs with LDAP

Eduroam wireless network Windows Vista

Computer Networks. Secure Systems

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Configuring connection settings

Wireless security. Any station within range of the RF receives data Two security mechanism

WIRELESS NETWORK SECURITY

Configure WorkGroup Bridge on the WAP131 Access Point

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Extension Wireless Access (EWA) v2.0

DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

ALL Mbits Powerline WLAN N Access Point. User s Manual

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Setting up Windows XP for WPA Wireless Access (ISU-OIT-WPA)

Internet access system through the Wireless Network of the University of Bologna (last update )

TL-WN422G High-Power Wireless USB Adapter

Exam Questions SY0-401

Internet Authentication Service (IAS) Operations Guide

Wireless Network Configuration Guide

Wireless Security for Mobile Computers

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Product Summary RADIUS Servers

How to connect to the diamonds wireless network with Vista.

Setting up a WiFi Network (WLAN)

Developing Network Security Strategies

Design and Implementation Guide. Apple iphone Compatibility

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

LevelOne WAP User s Manual. 108 Mbps Wireless Access Point

Table of Contents. Wireless Security...40 What is WEP?...40 Configure WEP...41 What is WPA?...42 Configure WPA-PSK (Personal)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Configuring Windows 7 to Use Encrypted (WPA-E) Wireless Services a...

Industrial Communication. Securing Industrial Wireless

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide


Securing your Linksys Wireless Router BEFW11S4 Abstract

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

802.1X Authentication

How To Set Up Isu-Oit-Wpa On Windows 7 For Wireless Access (Isu- Oit- Wpa) On A Pc Or Mac Or Ipa (Windows 7) On An Ipa Or Ipac (Windows

Security in IEEE WLANs

Configuring a Windows 2003 Server for IAS

Configuring Security Solutions

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Wi-Fi in Healthcare:

Nokia E61i Configuring connection settings

CS 356 Lecture 29 Wireless Security. Spring 2013

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Step-by-Step Guide for Setting Up VPN-based Remote Access in a

WLAN Information Security Best Practice Document

United States Trustee Program s Wireless LAN Security Checklist

Deploying iphone and ipad Virtual Private Networks

CTS2134 Introduction to Networking. Module Network Security

HP M n Access Point Configuration and Administration Guide

Seamless and Secure Access (SSA) Manual Configuration Guide for Windows 7

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

iphone in Business Security Overview

How to Access Coast Wi-Fi

chap18.wireless Network Security

Link Layer and Network Layer Security for Wireless Networks

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Transcription:

Implementing Security for Wireless Networks

Action Items for this session Learn something! Take notes! Fill out that evaluation. I love to see your comments and we want to make these better! Most important: Have fun today!

Why should you care about wireless security? B ecause 31337 h4x0r like this: are equipping vehicles like this: and using tools like these: to get info about your W LA N : so they crack it and gain access: so they can ØwN jø Ø like this:

They have their own convention!

Agenda Overview of Wireless Solutions Securing a Wireless Network Implementing a WLAN Using Password Authentication Configuring Wireless Network Infrastructure Components Configuring Wireless Network Clients

Identifying the Need to Secure a Wireless Network When designing security for a wireless network consider: Network authentication and authorization Data protection Wireless access point configuration Security management

The abuse is growing!

Common Threats to Wireless Networks Security Threats Include: 1.Disclosure of confidential information 2.Unauthorized access to data 3.Impersonation of an authorized client 4.Interruption of the wireless service 5.Unauthorized access to the Internet 6.Accidental threats 7.Unsecured home wireless setups 8.Unauthorized WLAN implementations

Understanding the Standards and Technologies Standard Description 802.11 802.11a A base specification that defines the transmission concepts for Wireless LANs Transmission speeds up to 54 megabits (Mbps) per second 802.11b 802.11g 802.11i (WPA2) 11 Mbps Good range 54 Mbps Shorter ranges than 802.11b Establishes a standard authentication and encryption process for wireless networks 802.1X - a standard that defines a port-based access control mechanism of authenticating access to a network and, as an option, for managing keys used to protect traffic

Implementation Options Wireless network implementation options include: Wi-Fi Protected Access with Pre-Shared Keys (WPA-PSK) Wireless network security using Protected Extensible Authentication Protocol (PEAP) and passwords Wireless network security using Certificate Services

Choose the right solution Wireless Network Solution Typical Environment Additional Infrastructure Components Required? Certificates Used for Client Authentication Passwords Used for Client Authentication Typical Data Encryption Method Wi-Fi Protected Access with Pre- Shared Keys (WPA- PSK) Small Office/Home Office (SOHO) None NO YES Uses WPA encryption key to authenticate to network WPA Password-based wireless network security Small to medium organization Internet Authentication Services (IAS) Certificate required for the IAS server NO However, a certificate is issued to validate the IAS server YES WPA or Dynamic WEP Certificate-based wireless network security Medium to large organization Internet Authentication Services (IAS) Certificate Services YES NO Certificates used but may be modified to require passwords WPA or Dynamic WEP

Agenda Overview of Wireless Solutions Securing a Wireless Network Implementing a WLAN Using Password Authentication Configuring Wireless Network Infrastructure Components Configuring Wireless Network Clients

Effective Authentication and Authorization Standard Description Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) Uses public key certificates to authenticate clients Protected Extensible Authentication Protocol- Microsoft-Challenge Handshake Authentication Protocol v2 (PEAP-MS-CHAP v2) A two-stage authentication method using a combination of TLS and MS- CHAP v2 for password authentication Tunneled Transport Layer Security (TTLS) A two-stage authentication method similar to PEAP Microsoft does not support this method

Protecting WLAN Data Transmissions Wireless data encryption standards in use today include: Wired Equivalent Privacy (WEP) Dynamic WEP, combined with 802.1X authentication, provides adequate data encryption and integrity Compatible with most hardware and software devices H ow is this a wired equivalent?! T rust m e: WEP sucks! Wi-Fi Protected Access (WPA/WPA2) Changes the encryption key with each packet Uses a longer initialization vector Adds a signed message integrity check value Incorporates an encrypted frame counter WPA uses TKIP, WPA2 uses AES

System Requirements for 802.1X Components Requirements Client devices Windows XP and Pocket PC 2003 provide built-in support Microsoft provides an 802.1X client for Windows 2000 operating systems RADIUS/IAS and certificate servers Windows Server 2003 Certificate Services and Windows Server 2003 Internet Authentication Service (IAS) are supported Wireless access points At a minimum, should support 802.1X authentication and 128-bit WEP for data encryption

Guidelines for Securing Wireless Networks Require data protection for all wireless communications Require 802.1X authentication to help prevent spoofing, wardrivers, and accidental threats to your network Use tools to locate and shut down rogue access points on your corporate network: O ver the A ir - Disassociation attack on rogue APs O ver the W ire Automatic switch port shutdown

Agenda Overview of Wireless Solutions Securing a Wireless Network Implementing a WLAN Using Password Authentication Configuring Wireless Network Infrastructure Components Configuring Wireless Network Clients

Components for PEAP-MS-CHAP v2 Components Wireless Client Wireless Access Point RADIUS/IAS Server Explanation Requires a WLAN adapter that supports 802.1X and dynamic WEP or WPA encryption User and computers accounts are created in the domain Must support 802.1X and dynamic WEP or WPA encryption The wireless access point and RADIUS server have a shared secret to enable them to securely identify each other Uses Active Directory to verify the credentials of WLAN clients Makes authorization decisions based upon an access policy May also collect accounting and audit information Certificate installed to provide server authentication

Agenda Overview of Wireless Solutions Securing a Wireless Network Implementing a WLAN Using Password Authentication Configuring Wireless Network Infrastructure Components Configuring Wireless Network Clients

Preparing the Environment Install the WLAN Scripts using: Microsoft WLAN-PEAP.msi Install the additional tools on the IAS servers: Group Policy Management Console CAPICOM DSACLs.exe

Configuring the Certification Authority The CA is used to issue Computer Certificates to the IAS Servers To install Certificate Services, log on with an account that is a member of: Enterprise Admins Domain Admins Consider that Certificate Services in Window Server 2003 Standard Edition does not provide: Auto enrollment of certificates to both computers and users Version 2 certificate templates Editable certificate templates Archival of keys

Reviewing the CA Installation Parameters Certificate Templates Available: Drive and path of CA request files: Length of CA Key: Validity Period: Validity Period of Issued Certificates: CRL Publishing Interval: CRL Overlap Period: Computer (Machine) C:\CAConfig 2048 bits 25 years 2 years 7 days 4 days

Installing the Certification Authority 1. Run MSSsetup CheckCAenvironment 2. Run MSSsetup InstallCA 3. Run MSSsetup VerifyCAInstall 4. Run MSSsetup ConfigureCA 5. Run MSSSetup ImportAutoenrollGPO 6. Run MSSsetup VerifyCAConfig Y ou can do all this in the G U I.but w hy?

Configuring the Certification Authority demo Install CA Configuring Post-Installation Settings Importing the Automatic Certificate Request GPO Verifying the Configuration

Configuring IAS Internet Authentication Service (IAS) uses Active Directory to verify and authenticate client credentials and makes authorization decisions based upon configured policies. IAS configuration categories include: IAS Server Settings IAS Access Policies RADIUS Logging

Reviewing IAS Configuration Parameters IAS parameters that are to be configured include: IAS Logging to Windows Event Log IAS RADIUS Logging Remote Access Policy Remote Access Policy Profile Are we going to script this?! Yes Sir!!!

Configuring the IAS Server Validating the IAS Environment demo Verifying IAS Server Certificate Deployment Post-Installation Configuration Tasks Modifying the WLAN Access Policy Profile Settings Verifying the Connection Request Policy for WLAN Exporting the IAS Settings

WAP Configuration Parameters Configure the basic network settings such as : IP configuration of the access point Friendly name of the access point Wireless network name (SSID) Typical Settings for a Wireless Access Point include: Authentication parameters Encryption parameters RADIUS authentication RADIUS accounting

Wireless Access Point Configuration demo Adding Access Points to the Initial IAS Server Configuring Wireless Access Points

Agenda Overview of Wireless Solutions Securing a Wireless Network Implementing a WLAN Using Password Authentication Configuring Wireless Network Infrastructure Components Configuring Wireless Network Clients

Controlling WLAN Access Using Security Groups IAS enables you to control access to the wireless network using Active Directory security groups that are linked to a specific remote access policy Security Group Default Members Wireless LAN Access Wireless LAN Users Wireless LAN Computers Wireless LAN Users Domain Users Wireless LAN Computers Domain Computers

Reviewing WLAN Client Parameters Parameter Setting Group to allow WLAN access Group to allow WLAN access for users Group to allow WLAN access for computers WLAN GPO Name GPO filtering security group Wireless network policy name WLAN network name (SSID) EAP type Wireless LAN Access Wireless LAN Users Wireless LAN Computers WLAN Client Settings Wireless LAN Computer Settings Windows XP WLAN Client Settings (PEAP-WEP) CONTOSO (change this to your SSID) PEAP PEAP authentication method Secured Password (EAP-MSCHAP v2) PEAP fast reconnect Enabled

Creating the WLAN Client Settings GPO demo Create a WLAN Client GPO Using the GPMC

Session Summary There are bad people out there who want your WLAN, but you can deploy it securely! D eterm ine your organization s w ireless requirem ents Require 802.1X authentication Implement the PEAP and Passwords solution for organizations that do not utilize a PKI infrastructure Use the scripts provided by the PEAP and Passwords solution Use security groups and Group Policy to control WLAN client access (.and stop kidding yourself w ith W E P )

Questions and Answers

Go away for 15 minutes