640 likes | 651 Views
This module provides an overview of wireless security challenges and covers the basics of securing WLANs. It discusses specific weaknesses and vulnerabilities of WLANs, security configuration for APs, bridges, and clients, and enterprise-level WLAN security.
E N D
IFIP-UNU ADVANCED COURSE ON NETWORKING AND SECURITYModule II-Wireless CommunicationsSection 8 • Wireless Security
Overview WLANs present unique security challenges. This module will cover the basics of securing WLANs. Specific weaknesses and vulnerabilities of WLANs will be covered. Security configuration for APs, bridges, and clients will be shown and explained. Finally, enterprise level WLAN security will be presented.
Learning Objectives • Understand the 3 types of vulnerabilities and attacks • Understand the 4 types of threats • Understand the importance of a security policy • Understand the 4 steps of the WLAN security wheel • Properly configure basic WLAN security via IOS GUI and CLI • Understand advance enterprise level WLAN security technologies and configuration principles
Key terms • WEP • TKIP • MIC • EAP • 802.1X • WPA • CCKM • RADIUS • SSH • Encryption • RSA RC4 (WEP) • DES, 3DES, AES • Cipher • BKR
Advanced Security Terms • WEP – Wired Equivalent Privacy • EAP – Extensible Authentication Protocol • TKIP – Temporal Key Integrity Protocol • CKIP – Cisco Key Integrity Protocol • CMIC – Cisco Message Integrity Check • Broadcast Key Rotation – Group Key Update • WPA – Wi-Fi Protected Access (WPA)
Vulnerabilities • Technology • TCP/IP • WEP and Broadcast SSID • Association Process • Wireless Interference • Configuration • Default passwords • Unneeded Services enabled • Few or no filters • Poor device maintenance • Policy • Weak Security Policy • No Security Policy • Poorly enforced Policy • Physical Access • Poor or no monitoring
Threats • Internal • External • Structured • Unstructured
WLAN Security Wheel Always have a good WLAN Security Policy in place. Secure the network based on the policy
WLAN Security Considerations • Authentication – only authorized users and devices should be allowed. • Encryption – traffic should be protected from unauthorized access. • Administration Security – only authorized users should be able to access and configure the AP configuration interfaces.
Common Protocols which use Encryption • When using a public network such as a WLAN, FTP, HTTP, POP3, and SMTP are insecure and should be avoided whenever possible. Utilize protocols with encryption. No Encryption Traffic Encryption Web Browsing HTTP HTTPS * File Transfer SCP TFTP or FTP Email POP3 or SMTP SPOP3 * Remote Mgmt Telnet SSH * SSL/TLS
WLAN Security Hierarchy Enhanced Security 802.1x, TKIP/WPA Encryption, Mutual Authentication, Scalable Key Mgmt., etc. Basic Security Open Access 40-bit or 128-bitStatic WEP Encryption No Encryption, Basic Authentication Home Use Business Public “Hotspots” VirtualPrivateNetwork (VPN) Business Traveler, Telecommuter Remote Access
Admin Authentication on AP • To prevent unauthorized access to the AP configuration interfaces: • Configure a secret password for the privileged mode access. (good) • Configure local usernames/passwords. (better) • Configure AP to utilize a security server for user access. (best)
WEP • WEP is a key. • WEP scrambles communications between AP and client. • AP and client must use same WEP keys. • WEP keys encrypt unicast and multicast. • WEP is easily attacked
? Supported Devices • What can be a client? • Client • Non-Root bridge • Repeater access point • Workgroup Bridge • Authenticator? • Root access point • Root bridge
Authentication Types • Open Authentication to the Access Point • Shared Key Authentication to the Access Point • EAP Authentication to the Network • MAC Address Authentication to the Network • Combining MAC-Based, EAP, and Open Authentication • Using CCKM for Authenticated Clients • Using WPA Key Management
WLAN Security:802.1X Authentication Radius Server AP • Mutual Authentication • EAP-TLS • EAP-Transport Layer Security • Mutual Authentication implementation • Used in WPA interoperability testing • LEAP • “Lightweight” EAP • Nearly all major OS’s supported: • WinXP/2K/NT/ME/98/95/CE, Linux, Mac, DOS • PEAP • “Protected” EAP • Uses certificates or One Time Passwords (OTP) • Supported by Cisco, Microsoft, & RSA • GTC (Cisco) & MSCHAPv2 (Microsoft) versions Client
EAP • Extensible Authentication Protocol (802.1x authentication) • Provides dynamic WEP keys to user devices. • Dynamic is more secure, since it changes. • Harder for intruders to hack…by the time they have performed the calculation to learn the key, they key has changed!
Basic RADIUS Topology • RADIUS can be implemented: • Locally on an IOS AP • Up to 50 users • On a ACS Server
ACS Server Options Cisco Secure ACS Software Cisco ACS Solution Engine
WPA Interoperable, Enterprise-Class Security
Cipher “Suite” • Cipher suites are sets of encryption and integrity algorithms. • Suites provide protection of WEP and allow use of authenticated key management. • Suites with TKIP provide best security. • Must use a cipher suite to enable: • WPA – Wi-Fi Protected Access • CCKM – Cisco Centralized Key Management
Configuring the Suite • Create WEP keys • Enable Cipher “Suite” and WEP • Configure Broadcast Key Rotation • Follow the Rules
Enterprise WLAN Security Evolution • TKIP/WPA • Successor to WEP • Cisco’s pre-standard TKIP has been shipping since Dec.’01 • Cisco introduced TKIP into 802.11i committee • 802.11i-standardized TKIP part of Wi-Fi Protected Access (WPA) • WPA software upgrade now available for AP1100 & AP1200 • AES • The “Gold Standard” of encryption • AES is part of 802.11i standard • - AES will be part of WPA2 standard (expected in 2004)